Cryptographic Authentication of Time-Invariant Quantities.
Richard E. LennonStephen M. MatyasCarl H. MeyerPublished in: IEEE Trans. Commun. (1981)
Keyphrases
- encryption decryption
- public key cryptography
- smart card
- secure communication
- elliptic curve cryptography
- fuzzy vault
- authentication scheme
- authentication protocol
- public key
- biometric authentication
- security analysis
- security protocols
- data security
- identity authentication
- digital signature
- identity management
- public key encryption
- semi fragile watermarking
- user authentication
- security mechanisms
- security requirements
- open loop
- secret key
- factor authentication
- hash functions
- biometric data
- image authentication
- cryptographic protocols
- multimodal biometrics
- digital watermarking