Efficient and complete remote authentication scheme with smart cards.
Wen-Gong ShiehWen-Bing HorngPublished in: ISI (2008)
Keyphrases
- smart card
- authentication scheme
- secret key
- security analysis
- authentication protocol
- security flaws
- security requirements
- java card
- information security
- security mechanisms
- digital signature
- sensitive data
- power analysis
- real time
- key management
- secure communication
- user authentication
- cost effective
- high dimensional