Login / Signup
An Analysis of a Three-Factor Authentication Scheme and Its Improved Fix.
Songsong Zhang
Xiang Li
Yong Xie
Published in:
ICAIS (2) (2019)
Keyphrases
</>
authentication scheme
information systems
wireless sensor networks
digital images
end to end
user authentication