A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key.
Trung Ngo ThanhTae-Young ChoePublished in: Int. J. Netw. Secur. (2016)
Keyphrases
- public key
- factor authentication
- public key cryptosystem
- security model
- private key
- security analysis
- public key cryptography
- elliptic curve cryptography
- diffie hellman
- encryption scheme
- authentication protocol
- public key infrastructure
- digital signature
- authentication scheme
- provably secure
- public key encryption
- signature scheme
- smart card
- trusted computing
- signcryption scheme
- blind signature scheme
- rfid tags
- blind signature
- security requirements
- query processing
- secret key
- high security
- standard model
- image encryption
- authentication systems
- key technologies
- elliptic curve
- mobile terminals