Memory Protection with Cached Authentication Trees.
Andy Belle-IsleMarcin LukowiakPublished in: MIXDES (2024)
Keyphrases
- response time
- decision trees
- memory usage
- privacy protection
- identity authentication
- memory space
- tree structure
- biometric template
- tree structures
- biometric authentication
- user authentication
- data protection
- fragile watermarking
- data encryption
- biometric data
- image authentication
- tree models
- authentication scheme
- limited memory
- phylogenetic trees
- secret key
- security requirements
- information security
- access control