Login / Signup
A new key authentication scheme based on discrete logarithms.
Cheng-Chi Lee
Min-Shiang Hwang
Li-Hua Li
Published in:
Appl. Math. Comput. (2003)
Keyphrases
</>
authentication scheme
image encryption
smart card
user authentication
secret key
high security
security analysis
security flaws
image authentication
real time
authentication protocol