Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
User-identification and key distribution with preserving anonymity is an important issue for remote access. Yang et al. proposed an efficient user identification and key distribution scheme preserving user anonymity. In this paper, we show the vulnerabilities of Yang's scheme against forgery and impersonation attacks. Further, we propose a highly secured protocol upholding the same properties.