Login / Signup
Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices.
Dongwoo Kang
Jongho Mun
Donghoon Lee
Dongho Won
Published in:
CSA/CUTE (2015)
Keyphrases
</>
authentication scheme
user authentication
secret key
context aware
smart card
ubiquitous computing environments
mobile devices
mobile terminals
ubiquitous computing
security analysis
authentication protocol
ubiquitous environment
sensor networks
similarity search
public key