Login / Signup
Securing Harari's Authentication Scheme.
Behzad Malek
Ali Miri
Published in:
Int. J. Netw. Secur. (2012)
Keyphrases
</>
authentication scheme
smart card
information security
image encryption
user authentication
secret key
security flaws
public key
authentication protocol
image authentication
key management