Secure Authentication Key Sharing between Personal Mobile Devices Based on Owner Identity.
Hideo NishimuraYoshihiko OmoriTakao YamashitaPublished in: J. Inf. Process. (2020)
Keyphrases
- identity management
- mobile devices
- personal information
- access control
- secure communication
- private key
- user centric
- third party
- authentication scheme
- user authentication
- authentication protocol
- authentication mechanism
- mobile phone
- security requirements
- context aware
- secure manner
- public key
- data encryption
- high security
- security analysis
- integrity verification
- information sharing
- factor authentication
- password authentication
- biometric authentication
- key distribution
- security mechanisms
- secret key
- mobile learning
- cloud computing
- diffie hellman
- digital signature
- trusted third party
- key agreement protocol
- social context
- security issues