Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments.
Arwa AlrawaisAbdulrahman AlhothailyXiuzhen ChengPublished in: WASA (2014)
Keyphrases
- authentication scheme
- access points
- user authentication
- smart card
- secret key
- wireless networks
- authentication protocol
- public key
- security flaws
- security analysis
- mobile users
- mobile devices
- key agreement
- wifi
- digital libraries
- information systems
- biometric systems
- key management
- wireless local area network
- real time