Login / Signup

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.

Jin WangJia YuDaxing LiXi BaiZhongtian Jia
Published in: CIS (2006)
Keyphrases
  • user authentication
  • standard model
  • security analysis
  • keystroke dynamics
  • authentication protocol
  • information security
  • peer to peer
  • biometric systems
  • signature scheme