Login / Signup

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System.

Eun-Jun YoonIl-Soo JeonKee-Young Yoo
Published in: IEICE Trans. Inf. Syst. (2011)
Keyphrases
  • authentication scheme
  • user authentication
  • partial occlusion
  • real time
  • smart card
  • image encryption
  • secret key
  • security analysis
  • authentication protocol
  • similarity search
  • tampering detection