Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments.
Cheng-Chi LeeMin-Shiang HwangI-En LiaoPublished in: IEEE Trans. Ind. Electron. (2006)
Keyphrases
- authentication scheme
- user authentication
- elliptic curve cryptography
- smart card
- security flaws
- security analysis
- authentication protocol
- image encryption
- secret key
- wireless networks
- mutual authentication
- key management
- security requirements
- security properties
- wireless communication
- public key
- ring signature scheme
- image authentication
- key agreement
- trusted third party
- privacy protection
- information security
- encryption scheme
- least significant bit