Combinatorial bounds and characterizations of splitting authentication codes.
Michael HuberPublished in: Cryptogr. Commun. (2010)
Keyphrases
- upper bound
- lower bound
- upper and lower bounds
- biometric authentication
- error correction
- lower and upper bounds
- fragile watermarking
- authentication scheme
- error bounds
- security mechanisms
- worst case
- authentication mechanism
- data encryption
- error correcting codes
- image authentication
- tight bounds
- identity management
- identity authentication
- acyclic database schemes
- knowledge base
- user authentication
- generalization bounds
- worst case bounds
- integrity verification
- average case