Exploiting hash functions to intensify the remote user authentication scheme.
WenBin HsiehJenq-Shiou LeuPublished in: Comput. Secur. (2012)
Keyphrases
- hash functions
- remote user authentication scheme
- smart card
- similarity search
- order preserving
- locality sensitive
- locality sensitive hashing
- hamming distance
- user authentication
- hashing algorithm
- nearest neighbor search
- minimal perfect hash functions
- hamming space
- secret key
- approximate similarity search
- data management
- data sets
- data distribution
- multi dimensional
- database systems
- information systems
- data mining