2015 11th International Conference on Information Assurance and Security (IAS) 2015
DOI: 10.1109/isias.2015.7492746
|View full text |Cite
|
Sign up to set email alerts
|

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment

Abstract: Recently, security issues are obstructing the development and using of cloud computing services. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to recognize any tampering with exchanges of the image document between two entities (sender and receiver) within the cloud environment. However, none of the existing solutions reduce the probability of known attacks by combining cryptographic hash function with a strong factor that should be periodical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 11 publications
0
0
0
Order By: Relevance