Login / Signup
An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Tianhan Gao
Ling Tan
Peiyu Qiao
Kangbin Yim
Published in:
Intell. Autom. Soft Comput. (2016)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
public key
mobile devices
security flaws
coarse to fine
security analysis
image authentication
real time
security requirements