Login / Signup
Spyware Resistant Smartphone User Authentication Scheme.
Taejin Kim
Jeong Hyun Yi
Changho Seo
Published in:
Int. J. Distributed Sens. Networks (2014)
Keyphrases
</>
authentication scheme
user authentication
secret key
smart card
mobile devices
authentication protocol
image encryption
security flaws
public key
distributed systems
end to end
information security
texture analysis