Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Authentication for Drone Delivery.
Chuxiong WuQiang ZengPublished in: CoRR (2023)
Keyphrases
- user authentication
- authentication systems
- authentication mechanism
- identity management
- security mechanisms
- access control
- authentication protocol
- password authentication
- security analysis
- authentication scheme
- data encryption
- biometric data
- trust negotiation
- security requirements
- factor authentication
- secure manner
- fuzzy vault
- user privacy
- integrity verification
- multimodal biometrics
- security level
- key distribution
- rights management
- encryption decryption
- cryptographic protocols
- security issues
- key exchange protocol
- smart card
- private key
- biometric authentication
- key agreement protocol
- access control policies
- biometric recognition
- public key cryptography
- data security
- biometric template
- key agreement
- public key encryption
- public key infrastructure
- security services
- public key
- electronic payment
- secure communication
- trusted platform module
- cloud computing
- trusted computing
- trust relationships
- fingerprint identification
- fingerprint recognition
- security systems
- secret key
- multi party
- biometric systems
- personal information