Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al....
Main Authors: | Yuanyuan Zhang, Muhammad Khurram Khan, Jianhua Chen, Debiao He |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2015-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2015/807213 |
Similar Items
-
Provable Secure Schemes for Authentication and Access Control Using Smart Cards
by: Fuw-Yi Yang, et al.
Published: (2004) -
Authentication and Group Secure Communications Using Elliptic Curve Cryptography
by: Shyi-Tsong Wu, et al.
Published: (2005) -
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
by: Liping Zhang, et al.
Published: (2016-01-01) -
An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
by: Jing-Yi Yang, et al.
Published: (2014) -
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography
by: Debiao He, et al.
Published: (2017-01-01)