Keyphrases
- authentication scheme
- security issues
- decision trees
- lightweight
- security requirements
- key management
- security analysis
- authentication protocol
- user authentication
- scalar product
- neural network
- transport network
- authentication mechanism
- stream cipher
- key exchange
- cryptographic protocols
- standard model
- multi party
- digital libraries
- case study
- information systems