Compression with Authenticated Encryption for Enhanced Security on Data Centric Products.
Neha TiwariBettahally N. KeshavamurthyPublished in: TENCON (2019)
Keyphrases
- data centric
- key exchange
- data security
- key exchange protocol
- encryption scheme
- key management
- security analysis
- key agreement protocol
- key distribution
- security properties
- encryption algorithms
- diffie hellman
- data management
- wireless sensor networks
- encryption algorithm
- private key
- business processes
- authentication scheme
- password based authenticated key exchange
- routing protocol
- information management
- data driven
- security requirements
- application development
- xml schema
- distributed systems
- secret key
- data storage
- virtual private network
- information integration
- data representation
- smart card
- digital signature
- security protocols
- management system
- secure communication
- information security
- hash functions