Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices.
Toan-Thinh TruongVi-Minh LuongMinh-Triet TranAnh Duc DuongPublished in: CIS (2016)
Keyphrases
- authentication scheme
- key management
- secret key
- user authentication
- key distribution
- smart card
- image encryption
- signature scheme
- public key
- authentication protocol
- security analysis
- encryption scheme
- security flaws
- image authentication
- elliptic curve cryptography
- wireless sensor networks
- digital signature
- resource constrained
- secret sharing scheme
- group communication
- low cost
- mutual authentication
- security protocols
- security requirements
- embedded systems
- ad hoc networks
- lightweight
- anomaly detection
- security services