Secure authentication of users' identity to deny illegitimate … network assets. … In this study a sequence and convenient user … public-key cryptographic techniques. This two-round protocol assumes that … a user access terminal. This protocol provides a … at no extra cost. By the use of … process, we considered two initialization protocols, with dumb … need not be exposed even to the trusted …
Google-1
Google-2
Copyright clearance needed for quotation.