A Breach into the Authentication with Built-in Camera (ABC) Protocol.
Cezara BeneguiRadu Tudor IonescuPublished in: ACNS (2) (2020)
Keyphrases
- authentication protocol
- security analysis
- key distribution
- vision system
- hand held
- field of view
- trusted third party
- camera calibration
- real time
- camera parameters
- authentication mechanism
- multi camera
- mutual authentication
- lightweight
- key agreement protocol
- biometric authentication
- cryptographic protocols
- structure from motion
- artificial bee colony algorithm
- video camera
- surveillance system
- privacy issues
- public key cryptography
- wireless local area network
- password authentication
- provably secure
- user authentication
- multi view
- key management
- public key
- swarm intelligence
- smart card