Sign in

An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security.

Yulei ChenJianhua Chen
Published in: Trans. Emerg. Telecommun. Technol. (2022)
Keyphrases