Login / Signup
A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme.
Carolin Latze
Andreas Ruppen
Ulrich Ultes-Nitsche
Published in:
ISSA (2009)
Keyphrases
</>
authentication scheme
user authentication
image encryption
smart card
secret key
security flaws
authentication protocol
public key
low cost
security analysis
key management
elliptic curve cryptography
end to end
gabor filters