Back to Search Start Over

Application of Quaternion Numbers in Identification Scheme.

Authors :
Alimoradi, Reza
Source :
Journal of Network & Information Security; 2015, Vol. 3 Issue 2, p17-20, 4p
Publication Year :
2015

Abstract

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analysed. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
23216859
Volume :
3
Issue :
2
Database :
Complementary Index
Journal :
Journal of Network & Information Security
Publication Type :
Academic Journal
Accession number :
118239429
Full Text :
https://doi.org/10.21863/jnis/2015.3.2.008