Approach to vendor authentication.
Detlef HoudeauAmit Kumer MeherPublished in: Open Identity Summit (2014)
Keyphrases
- identity management
- biometric authentication
- user authentication
- authentication mechanism
- fragile watermarking
- identity authentication
- security mechanisms
- semi fragile watermarking
- data encryption
- authentication protocol
- image authentication
- digital watermarking
- security analysis
- case study
- decision trees
- software vendors
- information retrieval
- neural network
- integrity verification
- databases
- database