• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Secure authentication protocols to resist off-line attacks on authentication data table.

Vinod Ramesh FalmariM. Brindha
Published in: J. Comput. Secur. (2024)
Keyphrases
  • authentication protocol
  • data analysis
  • data sources
  • data distribution
  • rfid tags
  • sensitive data
  • security analysis
  • information systems
  • computer systems
  • smart card
  • network security
  • cryptographic protocols