Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Jeng-Shyang PanTsu-Yang WuChien-Ming ChenEric Ke WangPublished in: IIH-MSP (2015)
Keyphrases
- security analysis
- high security
- private key
- public key
- smart card
- image encryption
- elliptic curve cryptography
- security requirements
- authentication scheme
- security model
- key exchange
- security properties
- encryption scheme
- mutual authentication
- authentication protocol
- user authentication
- secure communication
- proxy signature scheme
- encryption algorithm
- password guessing
- information systems
- information security