Keyphrases
- intrusion detection
- protection scheme
- digital signature scheme
- authentication scheme
- identity based cryptography
- electronic voting
- high security
- key distribution
- authentication protocol
- public key cryptosystem
- security analysis
- computer security
- network security
- information security
- access control
- elliptic curve
- information systems
- security model
- security mechanisms
- security requirements
- security problems
- diffie hellman
- security issues
- statistical databases
- security policies
- authentication mechanism