Infinite families of optimal splitting authentication codes secure against spoofing attacks of higher order.
Yeow Meng CheeXiande ZhangHui ZhangPublished in: Adv. Math. Commun. (2011)
Keyphrases
- higher order
- security mechanisms
- security issues
- authentication scheme
- security requirements
- security analysis
- cryptographic protocols
- user authentication
- security services
- authentication mechanism
- semi fragile watermarking
- secure routing
- security protocols
- integrity verification
- factor authentication
- password authentication
- chosen plaintext
- digital watermarking
- secure communication
- stream cipher
- key distribution
- authentication protocol
- resource constrained
- identity management
- biometric authentication
- rights management
- countermeasures