Login / Signup
Secure remote user access over insecure networks.
Mohammad Peyravian
Clark Jeffries
Published in:
Comput. Commun. (2006)
Keyphrases
</>
user access
user access patterns
authentication scheme
database
diffie hellman
key distribution
social networks
web users
website
web access
community detection
authentication protocol
web services
information sources
secret key