Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.
Krzysztof PietrzakPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- security mechanisms
- semi fragile watermarking
- digital watermarking
- detect malicious
- privacy preserving
- security threats
- countermeasures
- access control
- watermarking scheme
- resource constrained
- image authentication
- security requirements
- biometric template
- security systems
- security risks
- smart card
- security issues
- biometric authentication
- identity management
- fragile watermarking
- cooperative
- private data
- authentication scheme
- ddos attacks
- computer security