Sign in

Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem.

Dong SuKewei Lv
Published in: CSO (2) (2009)
Keyphrases
  • security analysis
  • security model
  • lightweight
  • user authentication
  • high security
  • database systems
  • smart card
  • computer networks
  • security requirements
  • public key
  • image encryption