An efficient client-client password-based authentication scheme with provable security.
Mohammad Sabzinejad FarashMahmoud Ahmadian-AttariPublished in: J. Supercomput. (2014)
Keyphrases
- authentication scheme
- user authentication
- mutual authentication
- security analysis
- authentication protocol
- key agreement
- smart card
- secret key
- elliptic curve cryptography
- security requirements
- security properties
- information security
- image encryption
- public key
- security flaws
- biometric systems
- security model
- key exchange
- intrusion detection
- access control
- privacy protection
- rfid tags
- network security
- key exchange protocol
- lightweight