Authentication of underwater assets.
Bálint Z. TéglásyEmil WengleJohn R. PotterSokratis K. KatsikasPublished in: Comput. Networks (2024)
Keyphrases
- identity authentication
- sensor networks
- user authentication
- underwater acoustic
- authentication scheme
- authentication protocol
- authentication mechanism
- security analysis
- security mechanisms
- financial markets
- digital watermarking
- image authentication
- genetic algorithm
- identity management
- integrity verification
- autonomous underwater vehicle
- semi fragile watermarking
- sonar images
- biometric authentication
- encryption decryption
- data encryption
- underwater vehicles
- digital images
- wireless sensor networks