Login / Signup

A novel user-participating authentication scheme.

Tzung-Her ChenJyun-Ci Huang
Published in: J. Syst. Softw. (2010)
Keyphrases
  • authentication scheme
  • user authentication
  • image encryption
  • data streams
  • authentication protocol
  • smart card
  • public key
  • secret key
  • security analysis