Login / Signup

Remarks on a new key authentication scheme based on discrete logarithms.

Da-Zhi SunZhen-Fu CaoYu Sun
Published in: Appl. Math. Comput. (2005)
Keyphrases
  • authentication scheme
  • smart card
  • secret key
  • user authentication
  • image encryption
  • public key
  • high security
  • image authentication
  • security flaws
  • sensor networks
  • authentication protocol
  • private key