Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture.
Hongfeng ZhuJunlin LiuPublished in: Int. J. Netw. Secur. (2018)
Keyphrases
- distributed architecture
- protection scheme
- provably secure
- hash functions
- key management
- standard model
- key distribution
- security model
- public key
- signature scheme
- authentication scheme
- operating system
- diffie hellman
- security issues
- authentication protocol
- security properties
- access control
- security requirements
- security mechanisms
- video sequences
- spatial domain
- secret sharing scheme