Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography.
Lawrence O'GormanIrina RabinovichPublished in: IEEE Trans. Pattern Anal. Mach. Intell. (1998)
Keyphrases
- public key cryptography
- pattern recognition
- public key
- public key infrastructure
- security services
- digital signature
- elliptic curve
- authentication and key agreement
- provably secure
- security model
- information retrieval
- elliptic curve cryptography
- security analysis
- smart card
- metadata
- authentication protocol
- diffie hellman
- security mechanisms
- database
- key management
- end to end
- power consumption
- cloud computing
- access control
- signal processing
- bilinear pairings