Comments on four multi-server authentication protocols using smart card.
Jue-Sam ChouYalin ChenChun-Hui HuangYu-Siang HuangPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- smart card
- authentication protocol
- security analysis
- secret key
- authentication scheme
- information security
- user authentication
- security requirements
- digital signature
- java card
- remote user authentication scheme
- secure communication
- security mechanisms
- password authentication
- rfid tags
- cryptographic protocols
- power analysis
- ban logic
- operating system
- lightweight
- rfid systems
- low cost
- similarity measure