Login / Signup
A secure user authentication scheme using hash functions.
Eun-Jun Yoon
Eun-Kyung Ryu
Kee-Young Yoo
Published in:
ACM SIGOPS Oper. Syst. Rev. (2004)
Keyphrases
</>
authentication scheme
user authentication
hash functions
secret key
authentication protocol
image encryption
smart card
stream cipher
security analysis
security flaws
encryption scheme
similarity search
information security
block cipher
high security
key management
public key
hamming space
query processing