Login / Signup
A Hash-based Strong Password Authentication Protocol with User Anonymity.
Kumar V. Mangipudi
Rajendra S. Katti
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
user authentication
authentication protocol
smart card
hash functions
lightweight
authentication scheme
password authentication
public key
trusted third party
secret key
security analysis
security protocols
cost effective
session key
real time
cryptographic protocols
rfid systems
authentication mechanism