Keyphrases
- encryption decryption
- identity authentication
- data encryption
- security analysis
- public key cryptography
- integrity verification
- virtual private network
- computer graphics
- virtual reality
- elliptic curve cryptography
- image authentication
- user interaction
- user authentication
- secret key
- authentication scheme
- encryption algorithm
- mutual authentication
- encryption scheme
- security requirements
- communication channels
- user friendly
- fragile watermarking