Login / Signup
Anonymous authentication scheme in e-Health Cloud environment.
Amina Djellalbia
Nadjib Badache
Souad Benmeziane
Sihem Bensimessaoud
Published in:
ICITST (2016)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
public key
authentication protocol
security flaws
image authentication
peer to peer
security analysis
data mining
information systems
feature extraction