Login / Signup
Security analysis of Subterranean 2.0.
Ling Song
Yi Tu
Danping Shi
Lei Hu
Published in:
Des. Codes Cryptogr. (2021)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security model
security properties
image encryption
authentication protocol
high security
user authentication
encryption algorithm
encryption scheme
information security
private key
authentication scheme
information sharing
access control