ID-Based Deniable Authentication Protocol Suitable for Mobile Devices.
Jayaprakash KarPublished in: MobiSec (2011)
Keyphrases
- authentication protocol
- public key
- mobile devices
- key distribution
- smart card
- security analysis
- lightweight
- signature scheme
- context aware
- secret key
- security protocols
- diffie hellman
- private key
- rfid systems
- mutual authentication
- cryptographic protocols
- rfid tags
- digital signature
- security requirements
- encryption scheme
- hash functions
- data management
- wireless sensor networks