Login / Signup
True2F: Backdoor-resistant authentication tokens.
Emma Dauterman
Henry Corrigan-Gibbs
David Mazières
Dan Boneh
Dominic Rizzo
Published in:
CoRR (2018)
Keyphrases
</>
identity authentication
biometric authentication
line segments
security analysis
user authentication
fragile watermarking
data sets
information retrieval
learning algorithm
search algorithm
computational complexity
lower bound
security mechanisms
image authentication
semi fragile watermarking