Keyphrases
- authentication scheme
- high security
- image encryption
- user authentication
- smart card
- elliptic curve cryptography
- secret key
- security analysis
- public key
- private key
- security flaws
- secure communication
- authentication protocol
- key distribution
- key management
- image authentication
- information security
- security protocols
- mutual authentication
- key agreement
- security policies
- network security
- access control
- information systems
- security properties
- wireless networks
- intrusion detection