Login / Signup
Cryptanalysis of a recent two factor authentication scheme.
Michael Scott
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
authentication scheme
secret key
smart card
image encryption
user authentication
security flaws
public key
key management
security analysis
image authentication
data mining
anomaly detection
authentication protocol
low cost