Enhanced Security Authentication Based on Convolutional-LSTM Networks.
Xiaoying QiuXuan SunMonson HayesPublished in: Sensors (2021)
Keyphrases
- security requirements
- security mechanisms
- user authentication
- identity authentication
- encryption decryption
- data encryption
- authentication mechanism
- security analysis
- fuzzy vault
- authentication protocol
- security services
- security issues
- network security
- authentication scheme
- information security
- security policies
- social networks
- factor authentication
- security systems
- identity management
- public key infrastructure
- public key cryptography
- smart card
- security protocols
- enterprise network
- key agreement
- integrity verification
- biometric data
- key agreement protocol
- access control
- virtual private network
- network structure
- secure communication
- recurrent neural networks
- computer networks
- identity based cryptography
- network access
- key distribution
- elliptic curve
- key management
- statistical databases
- network architecture
- intrusion detection