Authentication of parties in piggy bank cryptography.
Prashanth BusireddygariSubhash C. KakPublished in: ACSSC (2017)
Keyphrases
- public key cryptography
- elliptic curve cryptography
- public key
- cellular automata
- information security
- user authentication
- biometric authentication
- security analysis
- elliptic curve
- authentication scheme
- image authentication
- authentication mechanism
- information systems
- private data
- partitioned data
- identity authentication
- security mechanisms
- security model
- authentication protocol
- factor authentication
- privacy preserving