A remote user authentication scheme using hash functions.
Cheng-Chi LeeLi-Hua LiMin-Shiang HwangPublished in: ACM SIGOPS Oper. Syst. Rev. (2002)
Keyphrases
- hash functions
- remote user authentication scheme
- smart card
- user authentication
- authentication protocol
- similarity search
- locality sensitive
- order preserving
- hashing algorithm
- data distribution
- hamming distance
- secret key
- encryption scheme
- locality sensitive hashing
- nearest neighbor search
- security analysis
- hamming space
- information security
- security requirements
- security mechanisms
- databases
- block cipher
- minimal perfect hash functions
- e government
- nearest neighbor
- knn
- data model
- data streams
- pattern recognition
- information systems
- neural network