Security Evaluation of Glitch Based Authentication Function for Edge AI.
Yusuke NozakiShu TakemotoYoshiya IkezakiMasaya YoshikawaPublished in: GCCE (2023)
Keyphrases
- security requirements
- artificial intelligence
- information flow
- security analysis
- identity authentication
- security mechanisms
- authentication protocol
- data encryption
- intelligent systems
- fuzzy vault
- authentication mechanism
- edge detection
- authentication scheme
- case based reasoning
- expert systems
- user authentication
- factor authentication
- security services
- security issues
- statistical databases
- network security
- elliptic curve cryptography
- identity based cryptography
- edge strength
- security model
- weighted graph
- intrusion detection
- access control
- multiscale