Login / Signup
A Robust Subtree-Based Authentication Scheme for TMIS Using Chaotic Hash Function.
Chandrashekhar Meshram
Mohammad S. Obaidat
Balqies Sadoun
Agbotiname Lucky Imoize
Vishesh P. Gaikwad
Published in:
CITS (2024)
Keyphrases
</>
authentication scheme
hash functions
chaotic map
secret key
image encryption
authentication protocol
smart card
similarity search
user authentication
security analysis
data distribution
hash table
digital images
encryption scheme
image authentication
provably secure