Login / Signup
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
Joanne Woodage
Rahul Chatterjee
Yevgeniy Dodis
Ari Juels
Thomas Ristenpart
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
security analysis
data encryption
security mechanisms
key distribution
user authentication
bayesian networks
security issues
security requirements
authentication scheme
trusted third party
integrity verification
password authentication