Login / Signup
A key authentication scheme with non-repudiation.
Min-Shiang Hwang
Li-Hua Li
Cheng-Chi Lee
Published in:
ACM SIGOPS Oper. Syst. Rev. (2004)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
security flaws
public key
security analysis
image authentication
image encryption
information systems
high security
real time
cost effective