Optimal Authentication Scheme for Mobile Communication System

To meet the security specifications many of existing user authentication schemes requires huge computational cost. This Huge computational cost is because many of the authentication methods used exponential operations. But this approach is not suitable for mobile devices. In this paper, the authors propose a low computation cost user authentication scheme for mobile communication. Their scheme uses only one-way hash functions and smart cards and can be implemented efficiently. The proposed scheme addresses the weakness appeared in existing methods and is well suitable for mobile communications.

Provided by: The World Topic: Security Date Added: Aug 2013 Format: PDF

Download Now

Find By Topic