A Proxy User Authentication Protocol Using Source-Based Image Morphing

Qian Mao, K. Bharanitharan, Chin-Chen Chang. A Proxy User Authentication Protocol Using Source-Based Image Morphing. Comput. J., 58(7):1573-1584, 2015. [doi]

@article{MaoBC15,
  title = {A Proxy User Authentication Protocol Using Source-Based Image Morphing},
  author = {Qian Mao and K. Bharanitharan and Chin-Chen Chang},
  year = {2015},
  doi = {10.1093/comjnl/bxu094},
  url = {http://dx.doi.org/10.1093/comjnl/bxu094},
  researchr = {https://researchr.org/publication/MaoBC15},
  cites = {0},
  citedby = {0},
  journal = {Comput. J.},
  volume = {58},
  number = {7},
  pages = {1573-1584},
}