A Trie-Based Authentication Scheme for Approximate String Queries.
Yu WangLiangyong YangJilian ZhangXuelian DengPublished in: IEICE Trans. Inf. Syst. (2024)
Keyphrases
- anomaly detection
- authentication scheme
- data structure
- smart card
- query processing
- query language
- user authentication
- secret key
- approximate answers
- public key
- image encryption
- security analysis
- data sources
- alphabet size
- security flaws
- information systems
- image authentication
- multi dimensional
- response time
- databases
- string matching
- suffix tree
- low cost