Login / Signup

Anonymous Authentication Scheme with Decentralized Multi-Authorities.

Hiroaki AnadaSeiko Arita
Published in: SMARTCOMP (2017)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • public key
  • image encryption
  • secret key
  • peer to peer
  • authentication protocol
  • security flaws
  • image authentication
  • real time
  • data mining
  • web services