Login / Signup
Cryptanalysis and Improvements on Some Graph-based Authentication Schemes
Mohammad Eftekhari
Herish Abdullah
Published in:
CoRR (2012)
Keyphrases
</>
key agreement
secret key
graph model
scatter search
biometric authentication
learning algorithm
information systems
metaheuristic
normalized cut
security analysis
key distribution
security properties
authentication scheme
graphical password