Login / Signup
Local Authentication in Insecure Environments.
Satoru Kawai
Published in:
Inf. Process. Lett. (1987)
Keyphrases
</>
authentication scheme
authentication protocol
key distribution
dynamic environments
real time
user authentication
case study
low cost
security analysis
highly dynamic
robotic systems
smart card
digital images
multi agent systems
multi agent
feature extraction
face recognition
search engine
data sets