Login / Signup
A Forgery Attack on A Low Computation Cost User Authentication Scheme.
Eun-Jun Yoon
Kee-Young Yoo
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
authentication scheme
chosen message
user authentication
secret key
authentication protocol
smart card
digital images
security flaws
image encryption
security analysis
image authentication
public key
biometric systems
encryption scheme