Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC".
Salman ShamshadKhalid MahmoodSaru KumariMuhammad Khurram KhanPublished in: IEEE Syst. J. (2021)
Keyphrases
- lightweight
- authentication protocol
- key agreement
- elliptic curve
- authentication scheme
- user authentication
- elliptic curve cryptography
- security analysis
- rfid tags
- error correction
- public key
- dos attacks
- smart card
- secret key
- information security
- key distribution
- mutual authentication
- encryption algorithm
- public key cryptography
- security architecture
- communication infrastructure
- digital signature
- security requirements
- data protection
- development environments
- wireless sensor networks