Return to Article Details Pseudonym Creation and Parameter Based Key Generation for a Robust Authentication using ECC Download Download PDF