Login / Signup
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Saru Kumari
Mridul Kumar Gupta
Muhammad Khurram Khan
Xiong Li
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
authentication scheme
user authentication
secret key
smart card
password guessing
image encryption
security analysis
security flaws
public key
authentication protocol
information security
image authentication
hash functions
face recognition