Three Constructions of Authentication/Secrecy Codes.
Cunsheng DingArto SalomaaPatrick SoléXiaojian TianPublished in: AAECC (2003)
Keyphrases
- key distribution
- security analysis
- mutual authentication
- biometric authentication
- key management
- error correction
- fault tolerant
- authentication protocol
- secret key
- authentication mechanism
- privacy protection
- security requirements
- public key
- user authentication
- image authentication
- identity authentication
- fragile watermarking
- integrity verification
- logical operations
- neural network
- error correcting codes
- authentication scheme
- private key
- signature scheme
- smart card
- end to end