Keyphrases
- user authentication
- authentication scheme
- object based video
- authentication mechanism
- authentication protocol
- identity management
- data encryption
- password authentication
- security requirements
- security mechanisms
- key distribution
- integrity verification
- image segmentation
- computational complexity
- smart card
- factor authentication