Keyphrases
- security analysis
- smart card
- digital signature
- public key
- private key
- big data
- signature scheme
- security requirements
- secret key
- cloud computing
- high security
- image encryption
- security model
- key technologies
- security properties
- information security
- mobile devices
- blind signature
- authentication protocol
- authentication scheme
- countermeasures
- blind signature scheme
- encryption scheme
- security mechanisms
- loosely coupled
- databases