Verifying and Fixing Password Authentication Protocol.
Xiaoqi MaRachel McCrindleXiaochun ChengPublished in: SNPD (2006)
Keyphrases
- authentication protocol
- user authentication
- password authentication
- smart card
- session key
- security analysis
- authentication scheme
- public key
- rfid tags
- authentication mechanism
- information security
- security protocols
- lightweight
- mutual authentication
- rfid systems
- hash functions
- key distribution
- secret key
- nearest neighbor
- key exchange protocol
- security requirements
- low cost
- data sets
- trusted third party
- data encryption
- database systems
- information systems