On the security of an authentication scheme for multi-server architecture.
Debiao HeJianhua ChenWenbo ShiMuhammad Khurram KhanPublished in: Int. J. Electron. Secur. Digit. Forensics (2013)
Keyphrases
- authentication scheme
- user authentication
- elliptic curve cryptography
- security flaws
- smart card
- image encryption
- security analysis
- authentication protocol
- secret key
- key management
- public key
- mutual authentication
- security requirements
- information security
- image authentication
- key agreement
- real time
- software architecture
- least significant bit
- high security
- password guessing