Login / Signup
A password authentication scheme over insecure networks.
I-En Liao
Cheng-Chi Lee
Min-Shiang Hwang
Published in:
J. Comput. Syst. Sci. (2006)
Keyphrases
</>
authentication scheme
user authentication
smart card
secret key
image encryption
authentication protocol
public key
security flaws
information security
security analysis
image authentication
password guessing
biometric systems
real time
computer networks
digital images
information systems