NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Xinyan ZhouXiaoyu JiChen YanJiangyi DengWenyuan XuPublished in: INFOCOM (2019)
Keyphrases
- authentication mechanism
- authentication scheme
- user authentication
- password authentication
- authentication protocol
- security mechanisms
- identity management
- data encryption
- security analysis
- factor authentication
- integrity verification
- key distribution
- security requirements
- secure manner
- secure communication
- rights management
- public key
- smart card
- public key cryptography
- security services
- key agreement
- private key
- security issues
- virtual private network
- mutual authentication
- public key encryption
- mobile terminals
- rfid tags
- access control
- biometric authentication
- key exchange protocol
- security protocols
- elliptic curve
- encryption decryption
- key management
- public key infrastructure
- cloud computing
- key agreement protocol
- trusted third party
- identity authentication
- diffie hellman
- information security
- resource constrained
- elliptic curve cryptography
- standard model
- electronic payment
- biometric data
- remote server
- authentication systems
- security level
- trust relationships