Secure Authentication Using Visual Cryptography.
Naveen KumarPublished in: Security and Management (2009)
Keyphrases
- visual cryptography
- secret sharing scheme
- authentication mechanism
- secret sharing
- secret image sharing
- visual cryptography scheme
- authentication scheme
- user authentication
- key management
- authentication protocol
- security analysis
- factor authentication
- security mechanisms
- secret image
- security requirements
- encryption scheme
- smart card
- black and white
- feature extraction
- quality of service
- lightweight
- wireless sensor networks