Login / Signup
A Two-Factor Authentication Scheme based on Negative Databases.
Ran Liu
Xiang Wang
Can Wang
Published in:
SSCI (2018)
Keyphrases
</>
authentication scheme
databases
smart card
user authentication
database systems
secret key
data management
image authentication
image encryption
security flaws
data model
data warehouse
data integration
public key
authentication protocol
real time
information systems