Security Analysis of Tu and Piramuthu's Protocol.
Jorge MunillaAlberto PeinadoPublished in: NTMS (2008)
Keyphrases
- security analysis
- mutual authentication
- authentication protocol
- smart card
- security model
- security requirements
- public key
- security properties
- high security
- image encryption
- key exchange
- secure electronic
- encryption scheme
- access control policies
- encryption algorithm
- access control
- user authentication
- distributed environment
- provably secure
- cryptographic protocols
- fine grained
- diffie hellman
- image quality
- database systems
- information systems