Keyphrases
- public key infrastructure
- public key
- trusted third party
- public key cryptography
- trust relationships
- image authentication
- access control
- security mechanisms
- biometric authentication
- authentication protocol
- digital signature
- identity management
- authentication scheme
- authentication mechanism
- key technologies
- data encryption
- databases
- identity authentication
- user authentication
- key distribution
- keystroke dynamics
- genetic algorithm
- encryption decryption
- data sets
- semi fragile watermarking