User Authentication Protocol Based on the Location Factor for a Mobile Environment.
Bartlomiejczyk MaciejImed El FrayMiroslaw KurkowskiSabina SzymoniakOlga Siedlecka-LamchPublished in: IEEE Access (2022)
Keyphrases
- user authentication
- mobile environments
- location dependent
- authentication protocol
- security analysis
- location based services
- mobile objects
- mobile users
- mobile devices
- authentication scheme
- mobile computing
- smart card
- lightweight
- computing environments
- mobile agents
- keystroke dynamics
- public key
- mobile applications
- security protocols
- context aware
- mobile networks
- secret key
- rfid tags
- hash functions
- information security
- mobile phone
- database
- road network
- low cost