Login / Signup
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Kuo-Hui Yeh
Nai-Wei Lo
Yingjiu Li
Published in:
Int. J. Commun. Syst. (2011)
Keyphrases
</>
authentication scheme
secret key
smart card
user authentication
public key
image encryption
security flaws
real time
software architecture
authentication protocol
image authentication
software engineering