Login / Signup
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol.
Walid I. Khedr
Published in:
J. Inf. Secur. Appl. (2018)
Keyphrases
</>
authentication protocol
lightweight
smart card
security analysis
rfid tags
public key
real time
data sets
low cost
data distribution
security protocols