Publication:

Collaborative Authentication Using Threshold Cryptography

 
dc.contributor.authorAbidin, Aysajan
dc.contributor.authorAly, Abdelrahaman
dc.contributor.authorMustafa, Mustafa A.
dc.contributor.orcidextAbidin, Aysajan::0000-0002-5128-3608
dc.contributor.orcidextMustafa, Mustafa A.::0000-0002-8772-8023
dc.date.accessioned2021-11-22T10:55:12Z
dc.date.available2021-11-02T16:01:31Z
dc.date.available2021-11-22T10:55:12Z
dc.date.embargo9999-12-31
dc.date.issued2020
dc.identifier.doi10.1007/978-3-030-39749-4_8
dc.identifier.eisbn978-3-030-39749-4
dc.identifier.isbn978-3-030-39748-7
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/37906
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage122
dc.source.conference2nd International Workshop on Emerging Technologies for Authorization and Authentication (ETAA)
dc.source.conferencedateSEP 27, 2019
dc.source.conferencelocationLuxembourg
dc.source.endpage137
dc.source.journalna
dc.source.numberofpages16
dc.source.volume11967
dc.subject.keywordsGENERATE STRONG KEYS
dc.subject.keywordsSIGNATURE SCHEME
dc.subject.keywordsFUZZY EXTRACTORS
dc.subject.keywordsIDENTIFICATION
dc.subject.keywordsBIOMETRICS
dc.subject.keywordsSECRET
dc.subject.keywordsSECURE
dc.title

Collaborative Authentication Using Threshold Cryptography

dc.typeProceedings paper
dspace.entity.typePublication
Files

Original bundle

Name:
Collaborative_Authentication_Using_Threshold_Cryptography.pdf
Size:
373.26 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
Publication available in collections: