Authentication schemes from actions on graphs, groups, or rings.
Dima GrigorievVladimir ShpilrainPublished in: Ann. Pure Appl. Log. (2010)
Keyphrases
- graph theory
- biometric authentication
- decision theoretic
- cluster analysis
- graph representation
- human activities
- situation calculus
- graph databases
- graph structure
- bipartite graph
- graph theoretic
- key agreement
- graph mining
- complex structures
- security mechanisms
- security protocols
- reasoning about actions
- key distribution
- authentication scheme
- image authentication
- identity authentication