Security Enhancement for a Low Computation Cost User Authentication Scheme.
Behnam SattarzadehMahdi AsadpourRasool JaliliPublished in: SECRYPT (2006)
Keyphrases
- authentication scheme
- user authentication
- image encryption
- security analysis
- authentication protocol
- elliptic curve cryptography
- smart card
- information security
- security flaws
- low computation cost
- key management
- public key
- high security
- secret key
- digital images
- real time
- biometric systems
- image authentication
- security policies
- intrusion detection
- mutual authentication
- access control