Login / Signup
Remote three-factor authentication scheme based on Fuzzy extractors.
Min Zhang
Jiashu Zhang
Ying Zhang
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
authentication scheme
smart card
secret key
image encryption
user authentication
fuzzy sets
security flaws
public key
real time
image authentication
security analysis
authentication protocol