Keyphrases
- biometric authentication
- information flow
- security analysis
- user authentication
- authentication mechanism
- authentication scheme
- image authentication
- fragile watermarking
- data encryption
- identity authentication
- identity management
- low cost
- security requirements
- concept lattice
- terrorist networks
- security services
- rough approximations
- network analysis
- authentication systems
- data sets
- database