Login / Signup
A User Authentication Scheme Not Requiring Secrecy in the Computer.
Arthur Evans Jr.
William Kantrowitz
Edwin Weiss
Published in:
Commun. ACM (1974)
Keyphrases
</>
authentication scheme
user authentication
security analysis
smart card
key management
mutual authentication
computer systems
public key
secret key
real time
information security
authentication protocol
image authentication