Keyphrases
- security analysis
- security requirements
- public key
- smart card
- security model
- high security
- security properties
- image encryption
- mutual authentication
- encryption scheme
- authentication protocol
- user authentication
- fine grained
- encryption algorithm
- data integration
- authentication scheme
- multiresolution
- information systems
- data mining