Login / Signup
Robust remote authentication scheme with smart cards.
Chun-I Fan
Yung-Cheng Chan
Zhi-Kai Zhang
Published in:
Comput. Secur. (2005)
Keyphrases
</>
smart card
authentication scheme
secret key
security analysis
information security
security flaws
authentication protocol
java card
security requirements
real time
digital signature
power analysis
secure communication
sensitive data
user authentication
password guessing
digital images
query processing