Login / Signup
A Usable and Secure Two-Factor Authentication Scheme.
Syed Akram
Mohammed Misbahuddin
G. Varaprasad
Published in:
Inf. Secur. J. A Glob. Perspect. (2012)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
public key
security flaws
authentication protocol
security analysis
elliptic curve cryptography
image authentication
key management
wireless sensor networks
private key
low cost
digital images
key agreement
sensor networks