A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things.
Licai LiuBingxing FangBeiting YiPublished in: APWeb Workshophs (2014)
Keyphrases
- constraint satisfaction problems
- key technologies
- constraint satisfaction
- biometric authentication
- mobile devices
- decomposition methods
- constraint propagation
- image authentication
- user authentication
- identity authentication
- ubiquitous computing
- biometric data
- arc consistency
- physical world
- authentication mechanism
- constraint programming
- np complete
- tree decompositions
- fragile watermarking
- tree decomposition
- constraint solving
- authentication protocol
- security mechanisms
- arc consistency algorithm
- ordering heuristics
- security requirements
- constraint networks