P-Shake: Towards Secure Authentication and Communication between Mobile Devices.
Xi FangLimin LiuShijie JiaXinyi ZhaoYang ZhangPublished in: WCNC (2021)
Keyphrases
- mobile devices
- secure communication
- computing devices
- user authentication
- communication technologies
- authentication scheme
- security mechanisms
- authentication mechanism
- authentication protocol
- secure manner
- data encryption
- resource constrained
- identity management
- factor authentication
- password authentication
- information sharing
- security analysis
- mobile learning
- mobile phone
- key distribution
- integrity verification
- security requirements
- multi party
- context aware
- smart card
- group communication
- wireless technologies
- communication systems
- secret key
- single point of failure
- mobile users
- wireless devices
- key management
- smart phones
- biometric authentication
- mobile computing
- diffie hellman
- remote server
- mobile terminals
- key agreement
- mobile applications
- communication networks
- access control
- key exchange protocol
- key agreement protocol
- ubiquitous computing
- security issues
- mobile commerce