Login / Signup

Practical authentication scheme for SIP.

Shuhua WuQiong PuFei Kang
Published in: Peer-to-Peer Netw. Appl. (2013)
Keyphrases
  • authentication scheme
  • smart card
  • image encryption
  • user authentication
  • security analysis
  • secret key
  • image authentication
  • security flaws
  • public key
  • authentication protocol
  • data mining
  • security issues