Login / Signup
A security analysis of techniques for long-term integrity protection.
Matthias Geihs
Denise Demirel
Johannes Buchmann
Published in:
PST (2016)
Keyphrases
</>
security analysis
long term
data protection
smart card
information security
security requirements
high security
public key
security model
image encryption
user authentication
authentication protocol
mutual authentication
privacy protection
encryption scheme
data security
data integrity
data mining