Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs.
Prosanta GopeTzonelih HwangPublished in: Inf. Technol. Control. (2015)
Keyphrases
- authentication protocol
- smart card
- security analysis
- security protocols
- ban logic
- lightweight
- user authentication
- public key
- cryptographic protocols
- rfid tags
- session key
- authentication scheme
- rfid systems
- mutual authentication
- security policies
- secret key
- access control
- key distribution
- security requirements
- access control systems
- password authentication
- security properties
- security mechanisms
- distributed systems
- security problems
- conflict resolution
- authentication mechanism