Login / Signup
An efficient two-factor authentication scheme based on negative databases: Experiments and extensions.
Ran Liu
Xiang Wang
Can Wang
Published in:
Appl. Soft Comput. (2022)
Keyphrases
</>
authentication scheme
databases
smart card
database systems
user authentication
secret key
image encryption
security flaws
public key
data model
image authentication
data management
information systems
data integration
data warehouse
low cost