Secure Passwords Through Enhanced Hashing.
Benjamin StrahsChuan YueHaining WangPublished in: LISA (2009)
Keyphrases
- user authentication
- hash functions
- information security
- sensitive data
- security issues
- order preserving
- authentication protocol
- authentication scheme
- key distribution
- database
- nearest neighbor search
- video copy detection
- similarity search
- lightweight
- hashing algorithm
- file organization
- linear hashing
- key management
- hash table
- cryptographic protocols
- security mechanisms
- security requirements
- smart card
- face recognition