Security analysis and improvement of a mutual authentication scheme under trusted computing.
Fahad T. Bin MuhayaPublished in: Int. J. Ad Hoc Ubiquitous Comput. (2015)
Keyphrases
- security analysis
- authentication scheme
- trusted computing
- smart card
- user authentication
- public key
- image encryption
- authentication protocol
- access control policies
- elliptic curve cryptography
- computing platform
- encryption scheme
- security requirements
- computing environments
- mutual authentication
- secret key
- conflict resolution
- cloud computing