Login / Signup
Security analysis of SKI protocol.
Pouria Babvey
Habib Allah Yajam
Taraneh Eghlidos
Published in:
ISCISC (2014)
Keyphrases
</>
security analysis
authentication protocol
mutual authentication
public key
security model
security requirements
smart card
security properties
high security
encryption scheme
key exchange
secure electronic
image encryption
encryption algorithm
user authentication
lightweight