Login / Signup
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Seung-Hyun Kim
Daeseon Choi
Seung-Hun Jin
Sung-Hoon Lee
Published in:
Digital Identity Management (2013)
Keyphrases
</>
authentication scheme
real time
secret key
authentication protocol
smart card
qr code
secret data
user authentication
public key
security analysis
augmented reality
encryption scheme
human computer interaction
quality of service
security requirements
hash functions
mobile devices
high quality
image processing