Login / Signup
Practical anonymous user authentication scheme with security proof.
Hung-Yu Chien
Published in:
Comput. Secur. (2008)
Keyphrases
</>
authentication scheme
user authentication
security analysis
information security
security flaws
authentication protocol
smart card
image encryption
elliptic curve cryptography
secret key
image authentication
peer to peer
security policies
security properties
high security
mutual authentication