Login / Signup
Password authentication schemes with smart cards.
Wen-Her Yang
Shiuh-Pyng Shieh
Published in:
Comput. Secur. (1999)
Keyphrases
</>
password authentication
smart card
authentication protocol
information security
security requirements
security analysis
security mechanisms
java card
key exchange protocol
remote user authentication scheme
secure communication
digital signature
power analysis
secret key
resource constrained
user authentication