Keyphrases
- multi armed bandit
- remote user authentication scheme
- password guessing
- smart card
- user authentication
- security analysis
- multi armed bandits
- reinforcement learning
- authentication scheme
- decentralized decision making
- authentication protocol
- information security
- regret bounds
- security requirements
- public key
- secret key
- data mining
- multi agent
- machine learning