Sign in

Authentication Scheme Using Honey Sentences.

Nuril Kaunaini RofiatunnajahAri Moesriami Barmawi
Published in: FICC (2) (2023)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • secret key
  • image encryption
  • public key
  • security flaws
  • authentication protocol
  • image authentication
  • high dimensional
  • power consumption
  • security analysis