Login / Signup
An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table.
Wei-Bin Lee
Hsing-Bai Chen
Shun-Shyan Chang
Chia-Chi Yang
Published in:
IIH-MSP (2011)
Keyphrases
</>
authentication scheme
user authentication
anti phishing
smart card
information systems
end to end
image encryption
security flaws
real time
multimedia
learning environment
high dimensional
secret key
security analysis