Offline User Authentication Ensuring Non-Repudiation and Anonymity.
Ya-Fen ChangWei-Liang TaiKa-Ho FungPublished in: Sensors (2022)
Keyphrases
- user authentication
- trusted third party
- authentication protocol
- authentication scheme
- security analysis
- biometric authentication
- keystroke dynamics
- information security
- digital signature
- third party
- real time
- biometric systems
- smart card
- lightweight
- payment systems
- remote user authentication scheme
- data mining
- credit card
- signature scheme
- secret key
- privacy protection
- software engineering