Sign in
Remote login authentication scheme based on a geometric approach.
Tzong-Chen Wu
Published in:
Comput. Commun. (1995)
Keyphrases
</>
authentication scheme
user authentication
remote access
image encryption
smart card
secret key
security analysis
image authentication
security flaws
public key
real time
authentication protocol
biometric systems
digital images
information security