On the Security of "an efficient and complete remote user authentication scheme"
Manik Lal DasPublished in: CoRR (2008)
Keyphrases
- remote user authentication scheme
- user authentication
- smart card
- information security
- statistical databases
- security policies
- authentication scheme
- security issues
- network security
- access control
- security analysis
- intrusion detection
- security requirements
- real time
- computer networks
- security protocols
- similarity search