Login / Signup
A practical authentication protocol with anonymity for wireless access networks.
Yen-Cheng Chen
Shu-Chuan Chuang
Lo-Yao Yeh
Jiun-Long Huang
Published in:
Wirel. Commun. Mob. Comput. (2011)
Keyphrases
</>
authentication protocol
wireless access networks
trusted third party
smart card
security analysis
public key
lightweight
rfid tags
security protocols
anomaly detection
secret key