Login / Signup
Stream Authentication Scheme for the use over the IP Telephony.
Shintaro Ueda
Nobutaka Kawaguchi
Hiroshi Shigeno
Ken-ichi Okada
Published in:
AINA (2) (2004)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
data streams
public key
image authentication
security flaws
security analysis
real time
ip networks
authentication protocol
voice over internet protocol