Login / Signup
A Secure YS-Like User Authentication Scheme.
Tzungher Chen
Gwoboa Horng
Ke-Chiang Wu
Published in:
Informatica (2007)
Keyphrases
</>
authentication scheme
user authentication
smart card
security analysis
image encryption
security flaws
secret key
authentication protocol
image authentication
public key
information security
real time
elliptic curve cryptography
security model
lightweight
feature extraction
key agreement
information systems