MD5 hash function in image based smart card security.
Syed M. RahmanVincent Goh Boon YewPublished in: IRMA Conference (2000)
Keyphrases
- smart card
- hash functions
- authentication protocol
- secret key
- information security
- security requirements
- stream cipher
- java card
- security mechanisms
- security analysis
- fuzzy vault
- authentication scheme
- secure communication
- security enforcement
- provably secure
- encryption scheme
- key management
- sys tems
- block cipher
- similarity search
- hashing algorithm
- security model
- locality sensitive hashing
- digital signature
- user authentication
- pseudorandom
- remote user authentication scheme
- hamming distance
- security issues
- countermeasures
- security policies
- password guessing
- hashing methods
- hash tables
- network security
- data distribution
- hash table
- static analysis
- security protocols
- lightweight
- intrusion detection