Login / Signup
Anonymous Authentication Scheme Based on PUF.
Lukasz Krzywiecki
Published in:
ICISC (2015)
Keyphrases
</>
authentication scheme
smart card
electronic devices
user authentication
image encryption
secret key
image authentication
public key
security analysis
authentication protocol
data mining
peer to peer
security flaws
query processing
digital images
operating system