On Security of Universal Hash Function Based Multiple Authentication.
Aysajan AbidinPublished in: ICICS (2012)
Keyphrases
- hash functions
- authentication protocol
- security requirements
- data encryption
- block cipher
- security analysis
- stream cipher
- user authentication
- security mechanisms
- factor authentication
- security issues
- information security
- locality sensitive hashing
- similarity search
- provably secure
- authentication mechanism
- multi dimensional
- authentication scheme
- knn
- hash tables
- data structure
- databases
- data sets