Login / Signup
A Hash Tree Based Authentication Scheme in SIP Applications.
Ke Xu
Xiaowei Ma
Chunyu Liu
Published in:
ICC (2008)
Keyphrases
</>
authentication scheme
smart card
hash functions
secret key
image encryption
user authentication
security flaws
public key
authentication protocol
real time
security analysis
image authentication