A Review on Remote User Authentication Schemes Using Smart Cards.
Keerti SrivastavaAmit K. AwasthiR. C. MittalPublished in: QSHINE (2013)
Keyphrases
- smart card
- remote user authentication scheme
- user authentication
- password guessing
- authentication protocol
- security analysis
- authentication scheme
- information security
- remote access
- digital signature
- security requirements
- biometric authentication
- java card
- authentication systems
- graphical password
- secret key
- sensitive data
- power analysis
- security mechanisms
- information systems
- identity verification
- data distribution