Login / Signup
Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model.
Krishnaraj Bhat
Devesh Jinwala
Yamuna Prasad
Mukesh A. Zaveri
Published in:
IPMV (2023)
Keyphrases
</>
security analysis
security model
information systems
cost effective
similarity measure
authentication protocol
user authentication
elliptic curve cryptography