Login / Signup

Secure authentication protocols to resist off-line attacks on authentication data table.

Vinod Ramesh FalmariM. Brindha
Published in: J. Comput. Secur. (2024)
Keyphrases
  • authentication protocol
  • data analysis
  • data sources
  • data distribution
  • rfid tags
  • sensitive data
  • security analysis
  • information systems
  • computer systems
  • smart card
  • network security
  • cryptographic protocols