Login / Signup

A User Authentication Scheme with Identity and Location Privacy.

Shoichi HiroseSusumu Yoshida
Published in: ACISP (2001)
Keyphrases
  • authentication scheme
  • user authentication
  • location privacy
  • location information
  • end users
  • smart card
  • security analysis
  • public key
  • secret key
  • access control
  • user experience
  • mobile phone
  • authentication protocol