Login / Signup

Evaluation of Advanced Two Tier User Authentication scheme.

Ismail ButunYufeng WangRavi Sankar
Published in: CCNC (2012)
Keyphrases
  • authentication scheme
  • user authentication
  • smart card
  • image encryption
  • security analysis
  • image authentication
  • public key
  • secret key
  • authentication protocol
  • feature space
  • wireless sensor networks