Login / Signup
Authentication Scheme Using Honey Sentences.
Nuril Kaunaini Rofiatunnajah
Ari Moesriami Barmawi
Published in:
FICC (2) (2023)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
public key
security flaws
authentication protocol
image authentication
high dimensional
power consumption
security analysis