Login / Signup
Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
Ilsun You
Jae-Deok Lim
Jeong-Nyeo Kim
Hyobeom Ahn
Chang Choi
Published in:
IET Commun. (2016)
Keyphrases
</>
authentication scheme
mobile devices
user authentication
secret key
smart card
mobile users
context aware
public key
security flaws
mobile applications
wireless technologies
high dimensional
mobile phone
end to end
computer networks
authentication protocol