Secure Cryptosystem Implementation for Authentication Dongle.
Shrikant VinchurkarPublished in: Security and Management (2010)
Keyphrases
- key distribution
- private key
- user authentication
- security requirements
- authentication scheme
- authentication protocol
- password authentication
- identity management
- symmetric key
- integrity verification
- elliptic curve
- security mechanisms
- cellular automata
- data encryption
- public key cryptography
- digital signature
- security services
- authentication mechanism
- secure manner