2D bar-codes for authentication: A security approach.
Cléo BarasFrançois CayrePublished in: EUSIPCO (2012)
Keyphrases
- security mechanisms
- security requirements
- identity authentication
- user authentication
- authentication mechanism
- data encryption
- fuzzy vault
- security analysis
- factor authentication
- encryption decryption
- authentication protocol
- integrity verification
- biometric data
- security services
- authentication systems
- information security
- identity management
- security issues
- error correction
- authentication scheme
- key distribution
- virtual private network
- access control
- secure communication
- elliptic curve cryptography
- identity based cryptography
- high security
- public key infrastructure
- mutual authentication
- security systems
- data security
- key agreement
- intrusion detection
- key agreement protocol
- key management
- smart card
- computer security
- biometric authentication
- security policies
- private key
- security properties
- biometric systems
- public key cryptography
- network security
- biometric recognition
- statistical databases
- security model
- trusted platform module
- trusted third party
- public key
- security protocols
- security level
- image authentication
- trust negotiation
- trust relationships
- network access