A handover authentication using credentials based on chameleon hashing.
Jaeduck ChoiSouhwan JungPublished in: IEEE Commun. Lett. (2010)
Keyphrases
- trust negotiation
- access control
- order preserving
- biometric authentication
- hash functions
- fragile watermarking
- identity management
- locality sensitive hashing
- mobile communication
- security mechanisms
- nearest neighbor search
- mobile networks
- authentication mechanism
- user authentication
- image authentication
- factor authentication
- file organization
- hash tables
- data encryption
- authentication scheme
- linear hashing
- hashing algorithm
- integrity verification
- mobile ipv
- user privacy
- data structure
- authentication protocol
- security analysis
- access control policies
- security requirements
- hamming distance
- base station
- high dimensional