Login / Signup
Security Analysis on a Timestamp-based Remote User Authentication Scheme.
Zuowen Tan
Jianfeng Wang
Published in:
J. Comput. (2013)
Keyphrases
</>
image compression
security analysis
remote user authentication scheme
smart card
password guessing
user authentication
security requirements
authentication protocol
information security
authentication scheme
public key
secret key
sensitive data
security mechanisms
encryption scheme