Login / Signup
Secure authentication protocols to resist off-line attacks on authentication data table.
Vinod Ramesh Falmari
M. Brindha
Published in:
J. Comput. Secur. (2024)
Keyphrases
</>
authentication protocol
data analysis
data sources
data distribution
rfid tags
sensitive data
security analysis
information systems
computer systems
smart card
network security
cryptographic protocols