Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
Jong Hyuk ParkHyungjoo KimJungho KangPublished in: Symmetry (2016)
Keyphrases
- mobile communication
- key agreement
- public key encryption
- key distribution
- authentication scheme
- diffie hellman
- security analysis
- authentication protocol
- authentication mechanism
- key management
- security issues
- security requirements
- private key
- key agreement protocol
- provably secure
- cyber security
- encryption scheme
- security protocols
- wireless communication
- social networking
- elliptic curve
- smart card
- standard model
- user authentication
- mobile services
- graphical password
- wireless sensor networks
- information security
- public key
- signature scheme
- intrusion detection
- base station
- communication networks
- user interface
- rfid systems
- lightweight
- access control