Login / Signup
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.
Eun-Jun Yoon
Muhammad Khurram Khan
Kee-Young Yoo
Published in:
IEICE Trans. Inf. Syst. (2010)
Keyphrases
</>
authentication scheme
secret key
hash functions
authentication protocol
smart card
image encryption
similarity search
key management
security flaws
image authentication
data structure
public key
access control
data distribution
encryption scheme
user authentication
real time
image compression
ciphertext
data streams