Login / Signup
Efficient Delegation-based Authentication Protocol with Strong Mobile Privacy.
Jian-Zhu Lu
Hong-Qing Ren
Jipeng Zhou
Published in:
WINSYS (2011)
Keyphrases
</>
authentication protocol
lightweight
smart card
rfid systems
context aware
personal information
statistical databases
software engineering
low cost
image compression
cost effective
hash functions
public key
secret key
trusted third party