Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order
Yeow Meng CheeXiande ZhangHui ZhangPublished in: CoRR (2010)
Keyphrases
- higher order
- security mechanisms
- security issues
- security protocols
- user authentication
- authentication scheme
- data encryption
- error correction
- authentication mechanism
- access control
- smart card
- stream cipher
- security measures
- identity management
- security analysis
- integrity verification
- pairwise
- authentication protocol
- markov random field
- security services
- factor authentication
- countermeasures
- rights management
- chosen plaintext
- information leakage
- resource constrained
- security requirements
- rfid tags
- watermarking scheme