Login / Signup
Two-factor identity authentication scheme based on blockchain and fuzzy extractor.
Di Bao
Lin You
Published in:
Soft Comput. (2023)
Keyphrases
</>
authentication scheme
smart card
fuzzy sets
image encryption
user authentication
public key
secret key
security flaws
security analysis
real time
low cost
key management
authentication protocol
cost effective
image authentication
query processing
web services