Login / Signup
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Qinglong Huang
Haiping Huang
Wenming Wang
Qi Li
Yuhan Wu
Published in:
Wirel. Commun. Mob. Comput. (2020)
Keyphrases
</>
authentication scheme
smart card
secret key
image encryption
hash functions
user authentication
security flaws
image authentication
authentication protocol
real time
information systems
data mining
data structure
nearest neighbor
low cost
security analysis