Login / Signup

Multi-factor authentication using threshold cryptography.

Vishnu VenukumarVinod Pathari
Published in: ICACCI (2016)
Keyphrases
  • factor authentication
  • computer simulation
  • smart card
  • embedded systems