Login / Signup
Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity.
Dheerendra Mishra
Published in:
CoRR (2013)
Keyphrases
</>
authentication scheme
user authentication
secret key
smart card
image encryption
real time
key management
security analysis
authentication protocol
hash functions
image authentication
security flaws