Login / Signup
Authentication Protocols with Time Stamps: -- Encryption Algorithm Dependent.
Zhan Liu
Mi Lu
Published in:
International Conference on Internet Computing (2006)
Keyphrases
</>
encryption algorithm
security analysis
authentication protocol
smart card
encryption algorithms
public key
security requirements
pseudorandom
encryption scheme
secret key
lightweight
key distribution
image encryption
databases
digital content
wireless sensor networks
multimedia