Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
Eun-Jun YoonEun-Kyung RyuKee-Young YooPublished in: ICCSA (4) (2004)
Keyphrases
- authentication scheme
- user authentication
- information security
- password guessing
- security analysis
- security flaws
- smart card
- authentication protocol
- image encryption
- elliptic curve cryptography
- public key
- graphical password
- secret key
- security requirements
- key agreement
- biometric systems
- image authentication
- mutual authentication
- high security
- wireless sensor networks
- rfid tags
- least significant bit
- security issues
- security protocols
- sensitive data