Secure Authentication Scheme with Improved Anonymity for Wireless Environments.
JongHyup LeeTaekyoung KwonPublished in: IEICE Trans. Commun. (2011)
Keyphrases
- authentication scheme
- user authentication
- smart card
- image encryption
- secret key
- security flaws
- authentication protocol
- security analysis
- public key
- image authentication
- wireless networks
- key management
- real time
- trusted third party
- elliptic curve cryptography
- security properties
- resource constrained
- cost effective
- key agreement