Login / Signup
A PKC-based user authentication scheme without smart card.
Devender Kumar
Satish Chand
Bijendra Kumar
Published in:
J. Intell. Fuzzy Syst. (2018)
Keyphrases
</>
authentication scheme
smart card
user authentication
public key
secret key
authentication protocol
security analysis
security flaws
remote user authentication scheme
secure communication
digital signature
information security
security requirements
security mechanisms
sensitive data
high dimensional
differential power analysis