Login / Signup
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System.
Eun-Jun Yoon
Il-Soo Jeon
Kee-Young Yoo
Published in:
IEICE Trans. Inf. Syst. (2011)
Keyphrases
</>
authentication scheme
user authentication
partial occlusion
real time
smart card
image encryption
secret key
security analysis
authentication protocol
similarity search
tampering detection