ID-based authentication for mobile conference call.
Shiuh-Jeng WangLe-Pond ChinJin-Fu ChangYuh-Ren TsaiPublished in: SEC (1996)
Keyphrases
- key distribution
- mobile devices
- international conference
- key agreement
- mobile phone
- factor authentication
- selected papers
- advances in artificial intelligence
- mobile networks
- partially blind signature scheme
- mobile applications
- security analysis
- public key
- mobile technologies
- mobile learning
- security mechanisms
- context aware
- diffie hellman
- authentication scheme
- mobile environments
- mobile computing
- annual conference
- mobile commerce
- elliptic curve
- mobile users
- security model
- authentication protocol
- public key cryptography
- security requirements
- key management