Login / Signup
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading.
JaeYong Jeong
Yongsu Park
Yookun Cho
Published in:
IEICE Trans. Inf. Syst. (2005)
Keyphrases
</>
authentication scheme
smart card
secret key
user authentication
public key
image authentication
security flaws
image encryption
source code
authentication protocol
information systems
cost effective
information security
security analysis