Authentication Revisited.
Roger M. NeedhamMichael D. SchroederPublished in: ACM SIGOPS Oper. Syst. Rev. (1987)
Keyphrases
- authentication protocol
- image authentication
- user authentication
- fragile watermarking
- biometric authentication
- authentication scheme
- identity management
- data encryption
- authentication mechanism
- multiscale
- security requirements
- real world
- identity authentication
- real time
- lightweight
- image sequences
- website
- data sets
- multimodal biometrics