Login / Signup

An efficient remote anonymous authentication scheme with user revocation.

Yun-Xia DengRun-Hua Shi
Published in: Int. J. Secur. Networks (2018)
Keyphrases
  • authentication scheme
  • user authentication
  • public key
  • key management
  • smart card
  • security analysis
  • image encryption
  • secret key
  • real time
  • digital images
  • access control