Authentication using cryptography

被引:0
|
作者
Mitchell, Chris
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:25 / 32
相关论文
共 50 条
  • [41] Speckle visual cryptography for credential authentication
    Jiao, Anqing
    Zhu, Yupeng
    Mi, Zhaoke
    Zhou, Xinlong
    Zhu, Qiaofen
    Ke, Changjun
    Shi, Yishi
    [J]. APPLIED OPTICS, 2024, 63 (16) : 4351 - 4359
  • [42] Content based authentication of visual cryptography
    G. Wang
    W. Yan
    M. Kankanhalli
    [J]. Multimedia Tools and Applications, 2017, 76 : 9427 - 9441
  • [43] Content based authentication of visual cryptography
    Wang, G.
    Yan, W.
    Kankanhalli, M.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9427 - 9441
  • [44] Developing Visual Cryptography for Authentication on Smartphones
    Yang, Ching-Nung
    Liao, Jung-Kuo
    Wu, Fu-Heng
    Yamaguchi, Yasushi
    [J]. INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173
  • [45] Secure authentication on WiMAX with neural cryptography
    Hu, Dong
    Wang, YuYan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 366 - 369
  • [46] Service Layer Security Architecture for IOT Using Biometric Authentication and Cryptography Technique
    Sharma, Santosh Kumar
    Khuntia, Bonomali
    [J]. INTELLIGENT MANUFACTURING AND ENERGY SUSTAINABILITY, ICIMES 2019, 2020, 169 : 827 - 837
  • [47] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [48] A Design of Elliptic Curve Cryptography-based Authentication using QR Code
    Thiranant, Non
    Kang, Young-Jin
    Kim, Taeyong
    Jang, WonTae
    Park, Suhyun
    Lee, HoonJae
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619
  • [49] A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP
    Kumar, Akhitha S.
    Girish, K. P.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 673 - 679
  • [50] A Review towards Enhancing Authentication Scheme Using Image Fusion and Multishared Cryptography
    Gadicha, V. B.
    Alvi, A. S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 654 - 657