Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.
Krzysztof PietrzakPublished in: INDOCRYPT (2020)
Keyphrases
- security mechanisms
- semi fragile watermarking
- digital watermarking
- detect malicious
- image authentication
- watermarking scheme
- countermeasures
- access control
- user authentication
- security requirements
- private data
- security threats
- privacy preserving
- security issues
- smart card
- authentication scheme
- security protocols
- authentication protocol
- digital images
- security systems
- biometric template
- digital watermark
- fragile watermarking
- identity management
- data encryption
- security risks
- security analysis
- resource constrained
- multi hop
- copyright protection
- cooperative
- watermarking technique
- public key
- wireless sensor networks