Login / Signup
Research on User Authentication Scheme against the Man-in-the-Middle Attack.
Xiancun Zhou
Yan Xiong
Renjin Liu
Published in:
ICICA (2) (2012)
Keyphrases
</>
authentication scheme
user authentication
smart card
security flaws
public key
secret key
security analysis
image encryption
face recognition
similarity measure
response time