Login / Signup
Security Analysis of Fountain V1.
Matthew Beighton
Harry Bartlett
Leonie Simpson
Published in:
ACSW (2020)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
image encryption
authentication protocol
encryption scheme
security properties
security model
user authentication
mutual authentication
private key
authentication scheme
image quality
digital libraries
data mining