Login / Signup
An efficient stream authentication scheme using tree chaining.
Yongsu Park
Tae-Sun Chung
Yookun Cho
Published in:
Inf. Process. Lett. (2003)
Keyphrases
</>
authentication scheme
smart card
secret key
user authentication
data streams
image encryption
tree structure
image authentication
public key
security flaws
authentication protocol
response time
operating system
index structure
security analysis