Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme.
Maryam Rajabzadeh AsaarMahmoud SalmasizadehWilly SusiloPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- authentication scheme
- security analysis
- vehicular ad hoc networks
- smart card
- user authentication
- public key
- proxy signature scheme
- image encryption
- elliptic curve cryptography
- authentication protocol
- mutual authentication
- high security
- encryption scheme
- security requirements
- password guessing
- security model
- security properties
- secret key
- private key
- databases
- digital signature
- provably secure
- security mechanisms
- routing protocol
- database systems