Security Analysis of mvHash-B Similarity Hashing.
Monika SinghDonghoon ChangSomitra Kumar SanadhyaPublished in: J. Digit. Forensics Secur. Law (2016)
Keyphrases
- security analysis
- public key
- smart card
- security requirements
- security model
- high security
- hamming distance
- authentication protocol
- similarity measure
- image encryption
- encryption scheme
- security properties
- user authentication
- hash functions
- binary codes
- mutual authentication
- proxy signature scheme
- encryption algorithm
- data structure