An improvement of secure authentication scheme with full anonymity for wireless communications.
Chin-Hung WangTzu-Chieh WeiPo-Chin LeeChia-Chun WuPublished in: ICIS (2009)
Keyphrases
- authentication scheme
- wireless communication
- wireless networks
- user authentication
- smart card
- communication networks
- secret key
- computer simulation
- wireless sensor networks
- public key
- fourth generation
- authentication protocol
- security flaws
- cognitive radio
- wireless channels
- security analysis
- key management
- security properties
- lightweight