Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems".
Hsiao-Ling WuChin-Chen ChangPublished in: Multim. Tools Appl. (2018)
Keyphrases
- access control
- provably secure
- security model
- public key
- authentication scheme
- security mechanisms
- security analysis
- security policies
- security requirements
- key management
- information systems
- user authentication
- secret key
- access control policies
- standard model
- computer systems
- diffie hellman
- distributed systems
- signature scheme
- computing environments