Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Qi XieZhixiong TangKefei ChenPublished in: Comput. Electr. Eng. (2017)
Keyphrases
- authentication scheme
- mobile networks
- secret key
- smart card
- mobile users
- ad hoc networks
- mobile devices
- wireless networks
- base station
- user authentication
- public key
- security flaws
- peer to peer
- key management
- data sets
- hash functions
- signature scheme
- encryption scheme
- routing problem
- authentication protocol
- information security
- context aware