Login / Signup
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions.
Roberto Di Pietro
Gianluigi Me
Maurizio Adriano Strangio
Published in:
ICMB (2005)
Keyphrases
</>
authentication scheme
user authentication
smart card
image encryption
secret key
image authentication
public key
security analysis
security flaws
authentication protocol
elliptic curve cryptography
security requirements
mutual authentication
information systems
wireless networks
end to end