Login / Signup

Research on User Authentication Scheme against the Man-in-the-Middle Attack.

Xiancun ZhouYan XiongRenjin Liu
Published in: ICICA (2) (2012)
Keyphrases
  • authentication scheme
  • user authentication
  • smart card
  • security flaws
  • public key
  • secret key
  • security analysis
  • image encryption
  • face recognition
  • similarity measure
  • response time