Reliable and secure encryption key generation from fingerprints.
Weiguo ShengGareth HowellsMichael C. FairhurstFarzin DeraviShengyong ChenPublished in: Inf. Manag. Comput. Secur. (2012)
Keyphrases
- key exchange
- key management
- encryption scheme
- data encryption
- security properties
- digital signature
- cryptographic protocols
- stream cipher
- security analysis
- security requirements
- security issues
- integrity verification
- encryption decryption
- public key cryptography
- diffie hellman
- data confidentiality
- cryptographic algorithms
- private key
- data protection
- advanced encryption standard
- secret key
- digital rights management
- public key infrastructure
- secure communication
- identity authentication
- mutual authentication
- authentication scheme
- image encryption
- biometric data
- cost effective
- secret sharing scheme
- security model
- security protocols
- data sharing
- smart card