Login / Signup
Anonymous Authentication Scheme without Verification Table for Wireless Environments.
Ryoichi Isawa
Masakatu Morii
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2012)
Keyphrases
</>
authentication scheme
smart card
image encryption
user authentication
high security
secret key
wireless networks
security analysis
public key
security flaws
authentication protocol
wireless communication
image authentication
information security
lightweight
response time
data points
information systems