Keyphrases
- user authentication
- authentication scheme
- authentication systems
- sensitive data
- lightweight
- real time
- security analysis
- security issues
- neural network
- key management
- data sharing
- genetic algorithm
- digital signature
- authentication mechanism
- functional programs
- graphical password
- stream cipher
- user privacy
- information systems
- cryptographic protocols
- low cost
- biometric systems
- security model
- authentication protocol
- security protocols
- smart card
- information security
- security requirements
- texture synthesis