Login / Signup
New Authentication Scheme with No Verification Table.
Hye-Jin Yang
Jun-Cheol Jeon
Kee-Won Kim
Kee-Young Yoo
Published in:
CAINE (2005)
Keyphrases
</>
authentication scheme
image encryption
user authentication
smart card
high security
secret key
public key
image authentication
model checking
security flaws
authentication protocol
security analysis
formal verification
real time
lightweight
high dimensional data