Direct visualization of cryptographic keys for enhanced security.
Oleg LobachevPublished in: Vis. Comput. (2018)
Keyphrases
- key management
- security properties
- security protocols
- secret key
- hash functions
- encryption decryption
- encryption scheme
- smart card
- key agreement
- cryptographic protocols
- information security
- security requirements
- secure communication
- stream cipher
- cryptographic algorithms
- intrusion detection
- security analysis
- fuzzy vault
- security level
- random number generator
- private key
- elliptic curve cryptography
- data visualization
- authentication protocol
- self organizing maps
- network security
- public key
- security policies
- key establishment
- security issues
- public key cryptography
- access control
- security mechanisms
- identity based encryption
- public key encryption
- high assurance
- random number
- data analysis
- security services
- sensitive data
- ad hoc networks
- authentication scheme
- security systems
- elliptic curve
- standard model
- key management scheme
- data security
- visualization tool
- advanced encryption standard
- statistical databases
- privacy preserving
- packet filtering
- wireless sensor networks
- information systems