Login / Signup
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions.
Jee Hea An
Mihir Bellare
Published in:
CRYPTO (1999)
Keyphrases
</>
email
image authentication
simplifying assumptions
database
authentication protocol
user authentication
identity management
underlying assumptions
keystroke dynamics
neural network
case study
low cost
communication channels