Login / Signup
ICAS: Two-factor identity-concealed authentication scheme for remote-servers.
Md. Jakir Hossain
Chunxiang Xu
Chuang Li
S. M. Hasan Mahmud
Xiaojun Zhang
Wanpeng Li
Published in:
J. Syst. Archit. (2021)
Keyphrases
</>
authentication scheme
smart card
user authentication
remote server
secret key
image encryption
image authentication
real time
public key
security analysis
authentication protocol
security flaws
databases
wide area network
medical images
access control