Have a personal or library account? Click to login
Extended Authentication Based on Geometric Patterns and Transformations Cover

Extended Authentication Based on Geometric Patterns and Transformations

Open Access
|Nov 2024

Figures & Tables

Figure 1:

Communication in a symmetric system.
Communication in a symmetric system.

Figure 2:

Communication in an asymmetric system.
Communication in an asymmetric system.

Figure 3:

Examples of pin organization in a mechanical lock a) with one opening key b) with two opening keys.
Examples of pin organization in a mechanical lock a) with one opening key b) with two opening keys.

Figure 4:

Hierarchy of keys in a master-key system.
Hierarchy of keys in a master-key system.

Figure 5:

Externally tangent circles.
Externally tangent circles.

Figure 6:

Way of organizing keys in the master-key technique.
Way of organizing keys in the master-key technique.

Figure 7:

An example of related objects.
An example of related objects.

Figure 8:

Example of shifting two points of a linear function.
Example of shifting two points of a linear function.
Language: English
Submitted on: Mar 2, 2022
Published on: Nov 26, 2024
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Tomasz Krokosz, Jarogniew Rykowski, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.