Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey.
Long Hoang NguyenA. W. RoscoePublished in: J. Comput. Secur. (2011)
Keyphrases
- low bandwidth
- authentication protocol
- wireless networks
- mobile devices
- video conferencing
- communication cost
- security analysis
- wireless communication
- mobile computing
- high bandwidth
- smart card
- computing environments
- public key
- database server
- lightweight
- rfid tags
- data collection
- real time
- mobile networks
- databases
- security protocols
- mobile phone
- secret key
- end to end
- database systems