Login / Signup
A Secure and Practical Authentication Scheme Using Personal Devices.
Abdulrahman Alhothaily
Chunqiang Hu
Arwa Alrawais
Tianyi Song
Xiuzhen Cheng
Dechang Chen
Published in:
IEEE Access (2017)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
public key
security flaws
security analysis
authentication protocol
elliptic curve cryptography
image authentication
embedded systems
key management
information security
private key