Login / Signup

Secured Authentication Using Anonymity and Password-Based Key Derivation Function.

Mohd Izuan Mohd SaadKamarularifin Abd. JalilMazani Manaf
Published in: MobiWIS (2016)
Keyphrases
  • user authentication
  • security analysis
  • authentication protocol
  • authentication scheme
  • key exchange
  • information systems
  • key technologies
  • security requirements
  • image authentication