Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Li YangJianfeng MaQi JiangPublished in: Int. J. Netw. Secur. (2012)
Keyphrases
- smart card
- authentication scheme
- trusted computing
- information security
- computer security
- password guessing
- user authentication
- authentication protocol
- secret key
- computing environments
- security analysis
- security requirements
- cloud computing
- computing platform
- security issues
- digital signature
- sensitive data
- network security
- security mechanisms
- virtual organization
- secure communication
- power analysis
- peer to peer
- rfid tags