Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions.
Yoney Kirsal EverAgozie EnehOrhan GemikonakliLeonardo MostardaPublished in: KSII Trans. Internet Inf. Syst. (2014)
Keyphrases
- authentication protocol
- smart card
- secret key
- security analysis
- lightweight
- public key
- authentication scheme
- rfid tags
- secure communication
- constraint satisfaction problems
- rfid systems
- security protocols
- markov chain
- private key
- hash functions
- mutual authentication
- authentication mechanism
- key distribution
- real time
- trusted third party
- password authentication
- security requirements