Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Jongho MoonYoungsook LeeJiye KimDongho WonPublished in: Secur. Commun. Networks (2017)
Keyphrases
- authentication protocol
- mobile users
- provably secure
- public key
- hash functions
- security analysis
- security model
- key management
- mobile phone
- secret key
- signature scheme
- smart card
- mobile applications
- mobile devices
- context aware
- key distribution
- lightweight
- mobile agents
- standard model
- security protocols
- diffie hellman
- rfid tags
- resource constrained
- information sources
- digital signature
- data sets
- cost effective
- wireless sensor networks
- secure communication
- query processing
- databases