Attacks on the DECT authentication mechanisms.
Stefan LucksAndreas SchulerErik TewsRalf-Philipp WeinmannMatthias WenzelPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- security mechanisms
- semi fragile watermarking
- resource constrained
- access control
- security issues
- security services
- security threats
- security requirements
- security protocols
- operating system
- smart card
- security systems
- defense mechanisms
- digital watermarking
- detect malicious
- security analysis
- watermarking scheme
- biometric template
- authentication scheme
- security risks
- biometric authentication
- integrity verification
- countermeasures
- digital images