Protecting Applications with Transient Authentication.
Mark D. CornerBrian NoblePublished in: MobiSys (2003)
Keyphrases
- steady state
- identity authentication
- access control
- user authentication
- data protection
- semi fragile watermarking
- authentication mechanism
- identity management
- authentication scheme
- security requirements
- data sets
- security mechanisms
- image authentication
- biometric authentication
- trust relationships
- integrity verification
- fragile watermarking
- wireless networks
- database
- digital images
- case study
- multimodal biometrics
- website
- data encryption
- data mining