Login / Signup

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks.

Soobok ShinHongjin YehKangseok Kim
Published in: Peer-to-Peer Netw. Appl. (2015)
Keyphrases
  • user authentication
  • authentication scheme
  • security analysis
  • real time
  • image authentication
  • security flaws