Cryptanalysis of Two Authentication Scheme for DRM System.
Dheerendra MishraSourav MukhopadhyayPublished in: SNDS (2014)
Keyphrases
- authentication scheme
- secret key
- digital rights management
- smart card
- digital content
- public key
- image encryption
- image authentication
- security flaws
- hash functions
- encryption scheme
- signature scheme
- key management
- authentication protocol
- copyright protection
- user authentication
- ciphertext
- face recognition
- multimedia content
- information security
- cost effective
- anomaly detection
- digital images
- digital libraries