Login / Signup

A Remote Authentication Scheme Preserving User Anonymity.

Hung-Yu ChienChe-Hao Chen
Published in: AINA (2005)
Keyphrases
  • authentication scheme
  • user authentication
  • image encryption
  • smart card
  • secret key
  • real time
  • security analysis
  • authentication protocol
  • public key
  • image authentication
  • feature extraction
  • digital images
  • low cost