Login / Signup
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
Xiong Li
Jianwei Niu
Marimuthu Karuppiah
Saru Kumari
Fan Wu
Published in:
J. Medical Syst. (2016)
Keyphrases
</>
user authentication
authentication scheme
end to end
digital images
cryptographic protocols
security flaws