Continuous Authentication in Secure Messaging.
Benjamin DowlingFelix GüntherAlexandre PoirrierPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- data encryption
- security mechanisms
- identity management
- security analysis
- password authentication
- secure manner
- authentication protocol
- factor authentication
- security requirements
- key distribution
- integrity verification
- identity authentication
- secure communication
- rights management
- public key encryption
- encryption decryption
- private key
- access control
- public key cryptography
- fault tolerant
- lightweight
- information sharing
- security properties
- security services
- key agreement
- public key
- sensitive data
- fragile watermarking
- ad hoc networks
- mutual authentication
- key agreement protocol
- image authentication
- diffie hellman
- biometric authentication