How to Speak an Authentication Secret Securely from an Eavesdropper.
Lawrence O'GormanLynne Shapiro BrotmanMichael J. SammonPublished in: Security Protocols Workshop (2006)
Keyphrases
- secure manner
- trusted third party
- image authentication
- secret key
- secret sharing scheme
- biometric authentication
- authentication protocol
- secret sharing
- secret message
- information sharing
- secret information
- authentication scheme
- authentication mechanism
- security mechanisms
- digital watermarking
- user authentication
- identity authentication
- secret image sharing
- factor authentication
- semi fragile watermarking
- private data
- security analysis
- sensitive information
- multimodal biometrics
- visual cryptography
- identity management
- data encryption
- digital signature
- smart card
- third party