Two ID-based authenticated schemes with key agreement for mobile environments.
Chih-ho ChouKuo-Yu TsaiChung-Fu LuPublished in: J. Supercomput. (2013)
Keyphrases
- key agreement
- mobile environments
- key agreement protocol
- authentication scheme
- key distribution
- diffie hellman
- secret key
- mobile devices
- mobile computing
- elliptic curve
- mobile users
- smart card
- location based services
- provably secure
- security properties
- computing environments
- public key
- mobile agents
- context aware
- mobile applications
- group communication
- authentication protocol
- databases
- mutual authentication