Cryptanalysis of the Authentication in ACORN.
Tairong ShiJie GuanPublished in: KSII Trans. Internet Inf. Syst. (2019)
Keyphrases
- secret key
- biometric authentication
- image authentication
- authentication scheme
- scatter search
- user authentication
- fragile watermarking
- identity authentication
- neural network
- factor authentication
- digital watermarking
- hash functions
- real time
- information sharing
- security analysis
- key distribution
- block cipher
- information systems
- identity management
- databases
- keystroke dynamics
- encryption decryption
- authentication mechanism
- data sets