Login / Signup
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks.
Soobok Shin
Hongjin Yeh
Kangseok Kim
Published in:
Peer-to-Peer Netw. Appl. (2015)
Keyphrases
</>
user authentication
authentication scheme
security analysis
real time
image authentication
security flaws