A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
Shanshan LiChunxiang XuYuan ZhangJianying ZhouPublished in: IEEE Trans. Inf. Forensics Secur. (2022)
Keyphrases
- authentication scheme
- user authentication
- password guessing
- smart card
- low cost
- image encryption
- security analysis
- password authentication
- authentication protocol
- security flaws
- information security
- sensitive data
- real time
- secret key
- elliptic curve cryptography
- biometric systems
- embedded systems
- public key
- graphical password
- operating system
- computer systems
- information systems