Sign in

The eSAIDA Stream Authentication Scheme.

Yongsu ParkYookun Cho
Published in: ICCSA (4) (2004)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • data streams
  • secret key
  • image encryption
  • public key
  • image authentication
  • security flaws
  • real time
  • key management
  • authentication protocol