Loss-tolerant authentication with digital signatures.
Xixiang LvYi MuHui LiPublished in: Secur. Commun. Networks (2014)
Keyphrases
- digital signature
- security mechanisms
- digital watermarking
- public key cryptography
- public key
- trusted third party
- smart card
- private key
- security analysis
- authentication protocol
- resource constrained
- elliptic curve
- security issues
- signature scheme
- digital images
- security requirements
- key management
- operating system
- access control
- data integrity
- copyright protection
- discrete wavelet transform
- security model
- watermarking technique
- digital content
- end to end
- key distribution
- security services
- provably secure
- distributed systems
- digital libraries