Two-factor human authentication
Saved in:
Main Author: | Liang, Xian Liang |
---|---|
Format: | Final Year Project / Dissertation / Thesis |
Published: |
2018
|
Subjects: | |
Online Access: | http://eprints.utar.edu.my/3046/1/fyp_CS_2018_LXL_%2D_1403375.pdf http://eprints.utar.edu.my/3046/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An efficient pairing-free certificateless authenticated two-party key agreement protocol over elliptic curves
by: Ghoreishi, S. M., et al.
Published: (2015) -
Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity
by: Ghoreishi, Seyedmohsen
Published: (2019) -
Cloud cognitive authenticator (CCA): a public cloud computing authentication mechanism
by: Jivanadham, L. B., et al.
Published: (2013) -
A novel secure two-party identity-based authenticated key agreement protocol without bilinear pairings
by: Ghoreishi, S. M., et al.
Published: (2015) -
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
by: Mohammed, Hamdun, et al.
Published: (2017)