Login / Signup
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography.
Cheng-Chi Lee
Chun-Ta Li
Zhi-Wei Chen
Shun-Der Chen
Yan-Ming Lai
Published in:
Int. J. Electron. Secur. Digit. Forensics (2019)
Keyphrases
</>
authentication scheme
digital rights management
elliptic curve cryptography
digital content
smart card
image encryption
public key
secret key
access control
user authentication
security analysis
high security
databases
authentication protocol
information systems
data management