Login / Signup

Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model.

Krishnaraj BhatDevesh JinwalaYamuna PrasadMukesh A. Zaveri
Published in: IPMV (2023)
Keyphrases
  • security analysis
  • security model
  • information systems
  • cost effective
  • similarity measure
  • authentication protocol
  • user authentication
  • elliptic curve cryptography