Login / Signup
Security Analysis of Scan Obfuscation Techniques.
Yogendra Sao
Sk Subidh Ali
Published in:
IEEE Trans. Inf. Forensics Secur. (2023)
Keyphrases
</>
security analysis
smart card
security requirements
security model
high security
public key
image encryption
security properties
authentication protocol
user authentication
encryption scheme
mutual authentication
fine grained
encryption algorithm
information security
information systems
proxy signature scheme