Authentication of Real-Time Communication System Using KIS Scheme.
Binayak KarEric Hsiao-Kuang WuPublished in: EMC/HumanCom (2013)
Keyphrases
- real time
- authentication scheme
- image authentication
- secret image sharing
- security analysis
- key distribution
- low cost
- secure communication
- classification scheme
- biometric authentication
- vision system
- identity authentication
- wireless local area network
- digital watermarking
- authentication protocol
- detection scheme
- real time systems
- protection scheme
- data encryption
- high speed
- identity based cryptography
- pseudo random number