Login / Signup

Efficient authentication protocol with anonymity and key protection for mobile Internet users.

Yan JiangYouwen ZhuJian WangYong Xiang
Published in: J. Parallel Distributed Comput. (2020)
Keyphrases
  • internet users
  • authentication protocol
  • lightweight
  • privacy protection
  • trusted third party
  • smart card
  • secret key
  • website
  • data analysis
  • end users
  • intrusion detection