Sign in
Authentication schemes from actions on graphs, groups, or rings.
Dima Grigoriev
Vladimir Shpilrain
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
directed graph
graph theoretic
decision theoretic
graph theory
biometric authentication
graph representation
action selection
key agreement
video sequences
graphical password
data representations
reasoning about actions
group activities
security mechanisms
complex structures
graph databases
cluster analysis