Login / Signup
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Chin-Chen Chang
Iuon-Chang Lin
Published in:
Informatica (2005)
Keyphrases
</>
authentication scheme
secret key
user authentication
remote access
smart card
image encryption
public key
real time
security flaws
authentication protocol
hash functions
data streams
encryption scheme
key management
image authentication
tampering detection