An efficient and secure anonymous mobility network authentication scheme.
Wen-Chung KuoHong-Ji WeiJiin-Chiou ChengPublished in: J. Inf. Secur. Appl. (2014)
Keyphrases
- authentication scheme
- smart card
- user authentication
- image encryption
- secret key
- peer to peer
- public key
- authentication protocol
- security analysis
- security flaws
- wireless sensor networks
- computer networks
- image authentication
- mutual authentication
- low cost
- real time
- key management
- network traffic
- digital images
- elliptic curve cryptography