Login / Signup

A Hash Tree Based Authentication Scheme in SIP Applications.

Ke XuXiaowei MaChunyu Liu
Published in: ICC (2008)
Keyphrases
  • authentication scheme
  • smart card
  • hash functions
  • secret key
  • image encryption
  • user authentication
  • security flaws
  • public key
  • authentication protocol
  • real time
  • security analysis
  • image authentication