Keyphrases
- lightweight
- authentication scheme
- user authentication
- authentication protocol
- security analysis
- smart card
- image encryption
- elliptic curve cryptography
- information security
- rfid tags
- security flaws
- key management
- trusted third party
- secret key
- public key
- dos attacks
- rfid systems
- information systems
- security protocols
- security properties
- cloud computing
- wireless sensor networks
- location information
- security issues
- cryptographic protocols