Login / Signup
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Ziya Alper Genç
Gabriele Lenzini
Peter Y. A. Ryan
Itzel Vázquez Sandoval
Published in:
ICISSP (2018)
Keyphrases
</>
security analysis
smart card
security requirements
public key
high security
encryption scheme
security model
security properties
authentication protocol
image encryption
source code
mutual authentication
encryption algorithm
user authentication
authentication scheme
proxy signature scheme
secret key