Login / Signup
Further cryptanalysis of 'A remote authentication scheme using mobile device'.
Muhammad Khurram Khan
Saru Kumari
Mridul Kumar Gupta
Published in:
CASoN (2012)
Keyphrases
</>
authentication scheme
secret key
mobile devices
remote server
smart card
image encryption
public key
context aware
security flaws
image authentication
user authentication
real time
key management
authentication protocol
ciphertext
security analysis
hash functions
information security
information systems