Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city.
Qi XieLingfeng HwangPublished in: Neurocomputing (2019)
Keyphrases
- authentication scheme
- user authentication
- security analysis
- key management
- intrusion detection
- information security
- security requirements
- authentication protocol
- smart card
- access control
- security issues
- elliptic curve cryptography
- security flaws
- key agreement
- security policies
- security protocols
- security mechanisms
- secret key
- sensitive data
- smart city
- cost effective
- low cost