Login / Signup
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.
Goce Jakimoski
Published in:
Selected Areas in Cryptography (2006)
Keyphrases
</>
authentication scheme
user authentication
security analysis
security flaws
authentication protocol
smart card
elliptic curve cryptography
web services
cost effective
public key
key management
image authentication
information security
image encryption