Login / Signup

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.

Huahong TuAdam DoupéZiming ZhaoGail-Joon Ahn
Published in: Kaleidoscope (2016)
Keyphrases
  • authentication scheme
  • smart card
  • secret key
  • user authentication
  • image encryption
  • public key
  • authentication protocol
  • security flaws
  • key management
  • image authentication
  • feature vectors
  • security analysis