Login / Signup
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack.
Kosei Endo
Noboru Kunihiro
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2015)
Keyphrases
</>
security analysis
mutual authentication
authentication protocol
smart card
security model
security requirements
security properties
public key
secure electronic
high security
key exchange
user authentication
image encryption
encryption scheme
authentication scheme
encryption algorithm
secret key
private key