Login / Signup
How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme.
SeongHan Shin
Kazukuni Kobara
Published in:
IEICE Trans. Inf. Syst. (2018)
Keyphrases
</>
user authentication
authentication scheme
authentication protocol
security analysis
information security
security flaws
anonymous communication
biometric systems
smart card
security requirements
security properties
payment scheme