Login / Signup
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
Behnam Zahednejad
Majid Bayat
Ashok Kumar Das
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
authentication scheme
user authentication
smart card
intrusion detection
network traffic
public key