Sign in

Interactive Aggregate Message Authentication Scheme with Detecting Functionality.

Shingo SatoJunji Shikata
Published in: AINA (2019)
Keyphrases
  • authentication scheme
  • user authentication
  • smart card
  • secret key
  • image encryption
  • least significant bit
  • image authentication
  • public key
  • security flaws
  • key management
  • authentication protocol
  • security analysis