Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited...
Main Author: | Shin-Yan Chiou |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2013-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2013/858579 |
Similar Items
-
Steganography and Authentication Image Sharing Scheme Without Trusted Third Party
by: Jin-Fwu Ou Yang, et al.
Published: (2011) -
A Trusted Mobile Ride-Hailing Evaluation System With Privacy and Authentication
by: Shin-Yan Chiou, et al.
Published: (2020-01-01) -
On the study of the three-party authenticated key agreement
by: Shao-Fan Tseng, et al.
Published: (2013) -
Authenticated Key Agreement Protocol for Three Parties
by: Chang, Ku Yi, et al.
Published: (2006) -
Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control
by: Zhang, Zhen
Published: (2013)