Login / Signup

Remote three-factor authentication scheme based on Fuzzy extractors.

Min ZhangJiashu ZhangYing Zhang
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • authentication scheme
  • smart card
  • secret key
  • image encryption
  • user authentication
  • fuzzy sets
  • security flaws
  • public key
  • real time
  • image authentication
  • security analysis
  • authentication protocol