An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation.
Koji NuidaSatoshi FujitsuManabu HagiwaraHideki ImaiTakashi KitagawaKazuto OgawaHajime WatanabePublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
- security requirements
- security issues
- chosen plaintext
- security level
- security measures
- security mechanisms
- key management
- security protocols
- security model
- electronic voting
- sensitive data
- access control
- data encryption
- user authentication
- authentication protocol
- security analysis
- cryptographic protocols
- security management
- security architecture
- security policies
- digital signature scheme
- digital rights management
- network security
- fuzzy vault
- data security
- security properties
- identity management
- source code
- factor authentication
- integrity verification
- smart card
- electronic payment
- key exchange
- authentication scheme