Bucket-based authentication for outsourced databases.
Jieping WangXiaoyong DuJiaheng LuWei LuPublished in: Concurr. Comput. Pract. Exp. (2010)
Keyphrases
- outsourced databases
- biometric authentication
- third party
- user authentication
- fragile watermarking
- file organization
- authentication scheme
- authentication protocol
- service providers
- security analysis
- security requirements
- authentication mechanism
- data sets
- locality sensitive hashing
- image authentication
- access control
- factor authentication
- nearest neighbor