Login / Signup

An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm.

Ahmad AbusukhonZeyad MohammadAli Al-Thaher
Published in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases