An interactive and secure user authentication scheme for mobile devices.
Qibin SunZhi LiXudong JiangAlex ChiChung KotPublished in: ISCAS (2008)
Keyphrases
- authentication scheme
- user authentication
- mobile devices
- smart card
- user interaction
- image encryption
- authentication protocol
- security analysis
- security flaws
- secret key
- context aware
- elliptic curve cryptography
- real time
- image authentication
- digital images
- high dimensional
- information security
- mutual authentication