Sign in

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

Xiong LiJianwei NiuMarimuthu KaruppiahSaru KumariFan Wu
Published in: J. Medical Syst. (2016)
Keyphrases
  • user authentication
  • authentication scheme
  • end to end
  • digital images
  • cryptographic protocols
  • security flaws