Login / Signup
NMACA Approach Used to Build a Secure Message Authentication Code.
Raed Alosaimy
Khaled Alghathbar
Alaaeldin M. Hafez
Mohamed Hamdy Eldefrawy
Published in:
FGIT-SecTech/DRBC (2010)
Keyphrases
</>
message authentication codes
public key
image authentication
authentication scheme
user authentication
authentication mechanism
security level
security mechanisms
identity management
data encryption
authentication protocol
password authentication
integrity verification
noisy channel
security analysis
security requirements
factor authentication
secure manner
key distribution
private key
secure communication
public key cryptography
rights management
email
biometric authentication
security services
public key encryption
mutual authentication
security model
information security
source code
identity authentication
security issues
access control
key agreement
cloud computing
smart card
resource constrained
digital watermarking
encryption decryption
key agreement protocol
trusted third party
key management
key exchange protocol
secret key
trusted platform module
electronic payment
elliptic curve
digital signature