Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards.
Jung-Yoon KimHyoung-Kee ChoiPublished in: IEICE Trans. Inf. Syst. (2012)
Keyphrases
- remote user authentication scheme
- smart card
- information security
- digital signature
- java card
- security requirements
- secret key
- security mechanisms
- security analysis
- authentication scheme
- authentication protocol
- sensitive data
- user authentication
- password guessing
- cost effective
- wireless sensor networks
- countermeasures
- packet filtering