An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards.
Chin-Ling ChenYu-Fan LinNeng-Chung WangYoung-Long ChenPublished in: SNPD (2011)
Keyphrases
- remote user authentication scheme
- smart card
- information security
- secret key
- authentication scheme
- security analysis
- digital signature
- java card
- security requirements
- authentication protocol
- user authentication
- sensitive data
- security mechanisms
- password guessing
- wireless sensor networks
- rfid tags
- similarity search
- access control