Back to Search
Start Over
Application of Quaternion Numbers in Identification Scheme.
- Source :
- Journal of Network & Information Security; 2015, Vol. 3 Issue 2, p17-20, 4p
- Publication Year :
- 2015
-
Abstract
- The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analysed. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 23216859
- Volume :
- 3
- Issue :
- 2
- Database :
- Complementary Index
- Journal :
- Journal of Network & Information Security
- Publication Type :
- Academic Journal
- Accession number :
- 118239429
- Full Text :
- https://doi.org/10.21863/jnis/2015.3.2.008