Login / Signup
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem.
Normahirah Nek Abd Rahman
Muhammad Rezal Kamel Ariffin
Published in:
Int. J. Netw. Secur. (2016)
Keyphrases
</>
authentication protocol
smart card
security analysis
public key
lightweight
rfid tags
security protocols
secret key
software engineering
fine grained
rfid systems
real time
nearest neighbor
low cost
security requirements
password authentication