Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR).
Chun-Li LinChing-Po HungPublished in: IEICE Trans. Commun. (2006)
Keyphrases
- authentication protocol
- user authentication
- password authentication
- smart card
- session key
- security analysis
- lightweight
- authentication scheme
- authentication mechanism
- secret key
- public key
- rfid tags
- security protocols
- information security
- key distribution
- mutual authentication
- hash functions
- rfid systems
- security requirements
- secure communication
- data sets