Login / Signup
An Agreement Graph-Based-Authentication Scheme for 5G Networks.
Maroua Gharam
Noureddine Boudriga
Published in:
UNet (2017)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
security analysis
image authentication
authentication protocol
security flaws
digital images
information systems
high resolution
low cost
lightweight
computer networks
public key