Bounds and Characterizations of Authentication/Secrecy Schemes.
L. Rey A. CasseKeith M. MartinPeter R. WildPublished in: Des. Codes Cryptogr. (1998)
Keyphrases
- key distribution
- security analysis
- upper bound
- key agreement
- key management
- lower bound
- security properties
- graphical password
- mutual authentication
- upper and lower bounds
- worst case
- authentication protocol
- neural network
- biometric authentication
- user authentication
- error bounds
- digital watermarking
- security requirements
- identity authentication
- fault tolerant
- access control