Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network.
Muhammad Ajmal AzadSamiran BagCharith PereraMahmoud BarhamgiFeng HaoPublished in: IEEE Trans. Ind. Informatics (2020)
Keyphrases
- learning experience
- identity authentication
- learning environment
- biometric authentication
- user authentication
- fragile watermarking
- security requirements
- security analysis
- security mechanisms
- data encryption
- image authentication
- authentication scheme
- authentication protocol
- real time
- integrity verification
- identity management
- neural network
- constructivist learning environments
- authentication mechanism
- electronic payment
- lightweight
- multimedia
- information retrieval
- data sets