Login / Signup
Masquerade on One-Time Password Authentication Scheme.
Chun-Li Lin
Ching-Po Hung
Published in:
FGCN (1) (2007)
Keyphrases
</>
authentication scheme
user authentication
image encryption
security analysis
information security
authentication protocol
image authentication
security flaws
biometric systems
digital images
low cost
secret key
information systems
evaluation model