NMACA Approach Used to Build a Secure Message Authentication Code.
Raed AlosaimyKhaled AlghathbarAlaaeldin M. HafezMohamed Hamdy EldefrawyPublished in: FGIT-SecTech/DRBC (2010)
Keyphrases
- message authentication codes
- public key
- image authentication
- authentication scheme
- user authentication
- authentication mechanism
- security level
- security mechanisms
- identity management
- data encryption
- authentication protocol
- password authentication
- integrity verification
- noisy channel
- security analysis
- security requirements
- factor authentication
- secure manner
- key distribution
- private key
- secure communication
- public key cryptography
- rights management
- biometric authentication
- security services
- public key encryption
- mutual authentication
- security model
- information security
- source code
- identity authentication
- security issues
- access control
- key agreement
- cloud computing
- smart card
- resource constrained
- digital watermarking
- encryption decryption
- key agreement protocol
- trusted third party
- key management
- key exchange protocol
- secret key
- trusted platform module
- electronic payment
- elliptic curve
- digital signature