Trade-Off Between Authentication Performance and Detection Time for Zero-Effort Attack in Location-Based Authentication.
Ryosuke KobayashiRie Shigetomi YamaguchiPublished in: FPS (2) (2023)
Keyphrases
- trade off
- authentication mechanism
- authentication protocol
- biometric authentication
- detect malicious
- data encryption
- user authentication
- identity authentication
- authentication scheme
- fragile watermarking
- automatic detection
- security mechanisms
- image authentication
- trust relationships
- attack detection
- detection algorithm
- lightweight
- object detection
- key distribution
- security analysis
- social networking
- key agreement protocol
- detection rate
- key agreement
- integrity verification