A tamper-proof and lightweight authentication scheme.
Ghaith HammouriErdinç ÖztürkBerk SunarPublished in: Pervasive Mob. Comput. (2008)
Keyphrases
- lightweight
- authentication scheme
- image authentication
- authentication protocol
- tampering detection
- user authentication
- smart card
- public key
- secret key
- security flaws
- wireless sensor networks
- communication infrastructure
- rfid tags
- security analysis
- development environments
- digital watermarking
- information security
- cryptographic protocols
- similarity search