An efficient and complete remote user authentication scheme using smart cards.
Horng-Twu LiawJiann-Fu LinWei-Chen WuPublished in: Math. Comput. Model. (2006)
Keyphrases
- remote user authentication scheme
- smart card
- information security
- security requirements
- digital signature
- authentication protocol
- sensitive data
- security analysis
- user authentication
- authentication scheme
- secret key
- security mechanisms
- password guessing
- java card
- power analysis
- differential power analysis
- cost effective
- data distribution
- packet filtering