Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Tanmoy MaitraMohammad S. ObaidatSK Hafizul IslamDebasis GiriRuhul AminPublished in: Secur. Commun. Networks (2016)
Keyphrases
- security analysis
- authentication scheme
- user authentication
- elliptic curve cryptography
- public key
- smart card
- image encryption
- security requirements
- password guessing
- encryption scheme
- authentication protocol
- security model
- security properties
- high security
- mutual authentication
- private key
- secret key
- operating system