Login / Signup
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing.
Wenting Li
Ping Wang
Published in:
CSCloud/EdgeCom (2019)
Keyphrases
</>
chaotic maps
image encryption
secret key
authentication scheme
security mechanisms
image encryption algorithm
image encryption scheme
user authentication