A New Scheme for Deniable/Repudiable Authentication.
Song Y. YanCarsten MapleGlyn JamesPublished in: CASC (2007)
Keyphrases
- authentication protocol
- authentication scheme
- security analysis
- smart card
- key distribution
- lightweight
- user authentication
- security protocols
- rfid tags
- public key
- hash functions
- secret key
- cost effective
- secure communication
- anomaly detection
- image authentication
- biometric authentication
- trusted third party
- authentication mechanism