Login / Signup
An efficient authentication protocol with user anonymity for mobile networks.
Huixian Li
Yafang Yang
Liaojun Pang
Published in:
WCNC (2013)
Keyphrases
</>
mobile networks
authentication protocol
ad hoc networks
user interface
user interaction
end users
wireless networks
smart card
mobile users
trusted third party
security analysis
base station
knn
data processing
mobile terminals