Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications.
Cheng-Chi LeeTsung-Hung LinChwei-Shyong TsaiPublished in: Secur. Commun. Networks (2012)
Keyphrases
- operating system
- authentication protocol
- wireless communication
- secret key
- lightweight
- wireless channels
- security analysis
- smart card
- wireless networks
- security protocols
- public key
- password authentication
- computer simulation
- physical layer
- hash functions
- authentication mechanism
- security requirements
- rfid tags
- communication networks
- quality of service
- distributed databases
- mobile communication
- cost effective