Keyphrases
- user authentication
- elliptic curve
- wireless sensor networks
- elliptic curve cryptography
- key management
- public key cryptography
- security analysis
- authentication protocol
- authentication scheme
- information security
- public key cryptosystems
- public key
- key distribution
- security protocols
- diffie hellman
- provably secure
- energy consumption
- resource constrained
- keystroke dynamics
- digital signature
- lightweight
- smart card
- cryptographic protocols
- sensor nodes
- sensor networks
- efficient computation
- routing algorithm
- security model
- biometric systems
- group communication
- high security
- information systems
- encryption scheme
- security requirements
- ad hoc networks