Secure Authentication Protocols Resistant to Guessing Attacks.
Jia-Ning LuoShiuh-Pyng ShiehJi-Chiang ShenPublished in: J. Inf. Sci. Eng. (2006)
Keyphrases
- authentication protocol
- security protocols
- cryptographic protocols
- security mechanisms
- smart card
- lightweight
- security analysis
- user authentication
- public key
- security properties
- key management
- rfid tags
- key distribution
- rfid systems
- ban logic
- secret key
- security requirements
- secure communication
- session key
- information systems
- block cipher
- stream cipher