Security on Aydos et al's Elliptic Curve Cryptography Based Wireless Authentication Protocol.
Yongliang LiuWen GaoHongxun YaoTiejun HuangPublished in: J. Comput. Res. Dev. (2006)
Keyphrases
- authentication protocol
- elliptic curve cryptography
- security analysis
- authentication scheme
- public key
- smart card
- user authentication
- high security
- public key cryptography
- security model
- security requirements
- wireless networks
- image encryption
- security protocols
- secret key
- lightweight
- wireless communication
- private key
- cryptographic protocols
- digital signature
- encryption scheme
- rfid tags
- key distribution
- diffie hellman
- secure communication
- key exchange
- information security
- encryption algorithm
- network security
- elliptic curve
- wireless sensor networks