An anonymous and provably secure authentication scheme for mobile user.
SK Hafizul IslamMohammad S. ObaidatRuhul AminPublished in: Int. J. Commun. Syst. (2016)
Keyphrases
- authentication scheme
- mobile users
- provably secure
- public key
- key management
- secret key
- security model
- mobile phone
- context aware
- signature scheme
- diffie hellman
- blind signature
- public key cryptography
- mobile devices
- security analysis
- digital signature
- mobile applications
- hash functions
- authentication protocol
- smart card
- blind signature scheme
- ad hoc networks
- peer to peer
- resource constrained
- standard model
- encryption scheme
- wireless sensor networks
- secure communication
- key distribution
- mobile agents
- private key
- user authentication
- rfid tags
- security protocols
- real time
- bilinear pairings