Login / Signup
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Ruhul Amin
SK Hafizul Islam
G. P. Biswas
Muhammad Khurram Khan
Published in:
CyberSA (2015)
Keyphrases
</>
mobile phone
authentication scheme
smart card
secret key
user authentication
mobile devices
security flaws
smart phones
mobile phone users
mobile users
authentication protocol
public key
security analysis
cellular networks
mobile technologies
network structure
social networks
information systems