Login / Signup
A User Convenient Secure Authentication Scheme for Accessing e-Governance Services.
Preeti Soni
Arup Kumar Pal
Kumari Khushboo
Published in:
ICCCNT (2019)
Keyphrases
</>
authentication scheme
user authentication
security analysis
smart card
secret key
authentication protocol
user privacy
web services
security flaws
image encryption
image authentication
information security
public key
lightweight
similarity search
security requirements