Login / Signup
An efficient remote anonymous authentication scheme with user revocation.
Yun-Xia Deng
Run-Hua Shi
Published in:
Int. J. Secur. Networks (2018)
Keyphrases
</>
authentication scheme
user authentication
public key
key management
smart card
security analysis
image encryption
secret key
real time
digital images
access control