Login / Signup
Remarks on a new key authentication scheme based on discrete logarithms.
Da-Zhi Sun
Zhen-Fu Cao
Yu Sun
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
authentication scheme
smart card
secret key
user authentication
image encryption
public key
high security
image authentication
security flaws
sensor networks
authentication protocol
private key