On message authentication with a correlated setup.
Shaoquan JiangPublished in: Inf. Process. Lett. (2016)
Keyphrases
- authentication mechanism
- biometric authentication
- image authentication
- highly correlated
- user authentication
- communication channels
- identity management
- data encryption
- real time
- factor authentication
- security analysis
- authentication protocol
- key distribution
- noisy channel
- keystroke dynamics
- fragile watermarking