Keyphrases
- security analysis
- authentication scheme
- information systems
- authentication protocol
- mutual authentication
- health information
- smart card
- security properties
- user authentication
- public key
- security requirements
- image encryption
- information security
- elliptic curve cryptography
- high security
- secret key
- security mechanisms
- security issues
- rfid systems
- encryption scheme
- password guessing
- sensitive data
- private information
- personal information
- privacy preserving
- private key
- software architecture
- trusted third party
- anomaly detection
- high dimensional