Login / Signup
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring.
Razi Arshad
Nassar Ikram
Published in:
Int. J. Netw. Secur. (2012)
Keyphrases
</>
authentication protocol
secret key
hash functions
smart card
security analysis
public key
lightweight
security protocols
signature scheme
rfid tags
key management
rfid systems
sensor networks
response time
similarity search
password authentication