Security Analysis of Niu et al. Authentication and Ownership Management Protocol.
Masoumeh SafkhaniHoda JannatiNasour BagheriPublished in: RFIDSec (2016)
Keyphrases
- security analysis
- authentication protocol
- mutual authentication
- smart card
- symmetric key
- security model
- public key
- security requirements
- user authentication
- security properties
- high security
- key exchange
- elliptic curve cryptography
- encryption scheme
- data management
- encryption algorithm
- authentication scheme
- information systems
- private key
- secure electronic
- knowledge management
- key distribution
- rfid tags
- digital content
- wireless sensor networks