A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Vanga OdeluAshok Kumar DasAdrijit GoswamiPublished in: Secur. Commun. Networks (2015)
Keyphrases
- computer networks
- security analysis
- user authentication
- network security
- trusted third party
- computer systems
- authentication protocol
- authentication scheme
- network management
- intrusion detection system
- network traffic
- lightweight
- security problems
- elliptic curve cryptography
- provably secure
- standard model
- intrusion detection
- digital signature
- privacy protection
- single point of failure