Login / Signup
Two-factor authentication scheme using attribute and password.
Jianghong Wei
Xuexian Hu
Wenfen Liu
Published in:
Int. J. Commun. Syst. (2017)
Keyphrases
</>
authentication scheme
user authentication
image encryption
smart card
authentication protocol
information security
secret key
security analysis
password guessing
security flaws
public key
image authentication
data mining
feature vectors