Public Key Authentication Schemes for Local Area Networks.
Tzungher ChenGwoboa HorngChuan-Sheng YangPublished in: Informatica (2008)
Keyphrases
- public key
- local area network
- image authentication
- public key cryptography
- security analysis
- provably secure
- authentication scheme
- authentication protocol
- private key
- message authentication codes
- elliptic curve cryptography
- public key encryption
- bilinear pairings
- session key
- security model
- public key infrastructure
- distributed processing
- digital signature
- secret key
- signature scheme
- secure communication
- tcp ip
- encryption scheme
- key distribution
- diffie hellman
- rfid tags
- standard model
- blind signature scheme
- user authentication
- real time
- key management
- distributed databases
- response time