Security Analysis of Niu et al. Authentication and Ownership Management Protocol.
Nasour BagheriMasoumeh SafkhaniHoda JannatiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- security analysis
- authentication protocol
- mutual authentication
- security requirements
- symmetric key
- security model
- user authentication
- smart card
- high security
- public key
- security properties
- key exchange
- encryption scheme
- authentication scheme
- secure electronic
- elliptic curve cryptography
- information systems
- network management
- data management
- encryption algorithm
- key distribution
- data access
- information security
- image quality