Login / Signup
A Modification to the 'Authentication of Concast Communication'.
Hossein Ghodosi
Josef Pieprzyk
Published in:
Cryptographic Algorithms and their Uses (2004)
Keyphrases
</>
communication networks
communication overhead
human computer
secure communication
communication channels
user authentication
database
data sets
social networks
face recognition
information sharing
share information
biometric authentication
identity management
identity authentication
factor authentication