Login / Signup
An authentication scheme based on the twisted conjugacy problem
Vladimir Shpilrain
Alexander Ushakov
Published in:
CoRR (2008)
Keyphrases
</>
authentication scheme
window search
smart card
image encryption
user authentication
public key
secret key
image authentication
authentication protocol
security flaws
real time
query processing
high resolution
key management