Login / Signup
An Asymmetric Authentication Protocol for M-Commerce Applications.
Li-Sha He
Ning Zhang
Published in:
ISCC (2003)
Keyphrases
</>
authentication protocol
smart card
security analysis
public key
lightweight
secret key
rfid tags
security protocols
mobile services
rfid systems
high dimensional data
third party
hash functions
trusted third party
password authentication