Login / Signup

Directed User Authentication Scheme Based on Discrete Logarithm.

Shaohua TangWeihua Ma
Published in: J. Circuits Syst. Comput. (1999)
Keyphrases
  • authentication scheme
  • user authentication
  • smart card
  • security flaws
  • real time
  • data mining
  • secret key
  • image authentication
  • image encryption
  • distributed environment