Login / Signup

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.

Tianhan GaoLing TanPeiyu QiaoKangbin Yim
Published in: Intell. Autom. Soft Comput. (2016)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • secret key
  • public key
  • mobile devices
  • security flaws
  • coarse to fine
  • security analysis
  • image authentication
  • real time
  • security requirements