Login / Signup
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography.
Liping Zhang
Shanyu Tang
Jing Chen
Shaohui Zhu
Published in:
Wirel. Pers. Commun. (2015)
Keyphrases
</>
authentication protocol
elliptic curve cryptography
security analysis
authentication scheme
user authentication
public key
smart card
high security
security properties
secret key
security model
real time
operating system