Cryptanalysis and Enhancement of a Password-Based Authentication Scheme.
Mohamed Hamdy EldefrawyJalal Al-MuhtadiPublished in: CloudCom (2015)
Keyphrases
- authentication scheme
- user authentication
- secret key
- key agreement
- authentication protocol
- diffie hellman
- smart card
- security analysis
- key exchange
- secure communication
- public key
- key exchange protocol
- hash functions
- security flaws
- image processing
- image authentication
- key distribution
- signature scheme
- encryption scheme
- information security
- key management
- biometric systems
- mutual authentication
- power consumption
- real time