Many-to-one encryption and authentication scheme and its application.
Xi Jun LinChuan Kun WuFeng LiuPublished in: J. Commun. Networks (2008)
Keyphrases
- authentication scheme
- image encryption
- secret key
- elliptic curve cryptography
- smart card
- image authentication
- mutual authentication
- key management
- public key
- user authentication
- high security
- security analysis
- digital signature
- security flaws
- encryption scheme
- authentication protocol
- private key
- ciphertext
- public key cryptography
- resource constrained
- wireless sensor networks