Hash-Based Authentication Revisited in the Age of High Performance Computers.
Niclas HedamJakob MollerupPinar TözünPublished in: ADMS@VLDB (2020)
Keyphrases
- transitive closure
- computer systems
- computer technology
- age related
- biometric authentication
- low cost
- fragile watermarking
- factor authentication
- sort merge
- data encryption
- data distribution
- query language
- image authentication
- distributed memory
- identity authentication
- security mechanisms
- security requirements
- index tree
- authentication mechanism
- smart card