Login / Signup

A practical authentication protocol with anonymity for wireless access networks.

Yen-Cheng ChenShu-Chuan ChuangLo-Yao YehJiun-Long Huang
Published in: Wirel. Commun. Mob. Comput. (2011)
Keyphrases
  • authentication protocol
  • wireless access networks
  • trusted third party
  • smart card
  • security analysis
  • public key
  • lightweight
  • rfid tags
  • security protocols
  • anomaly detection
  • secret key