Login / Signup
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
Runhua Shi
Hong Zhong
Shun Zhang
Published in:
J. Supercomput. (2015)
Keyphrases
</>
client server
authentication and key agreement
public key cryptography
database server
peer to peer
mobile agents
distributed databases
user interface
end users
security model
provably secure
public key
computer networks
security problems
mobile devices
databases
signature scheme
data integrity