How to Prevent to Delegate Authentication.
Mohsen AlimomeniReihaneh Safavi-NainiPublished in: SecureComm (2015)
Keyphrases
- biometric authentication
- security mechanisms
- user authentication
- data encryption
- authentication scheme
- real world
- identity authentication
- identity management
- information systems
- authentication protocol
- digital watermarking
- security requirements
- image authentication
- wireless networks
- case study
- database
- wireless local area network
- authentication mechanism
- fragile watermarking