Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Alwyn GohGeong Sen PohDavid Ngo Chek LingPublished in: Communications and Multimedia Security (2003)
Keyphrases
- signature verification
- data streams
- data integration
- sliding window
- graph theoretic
- biometric authentication
- graph theory
- graph structure
- image authentication
- graph representation
- graph databases
- signature recognition
- user authentication
- stream processing
- security mechanisms
- real time
- graph model
- directed graph
- database systems