Reliability-Security Tradeoff for Secure Transmission with Untrusted Relays.
Dechuan ChenWeiwei YangJianwei HuYueming CaiXin LiuPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2016)
Keyphrases
- sensitive data
- security policies
- security requirements
- security measures
- security issues
- security management
- security mechanisms
- security level
- security architecture
- access control
- key management
- information security
- security analysis
- security services
- smart card
- privacy preserving
- data security
- security patterns
- security properties
- security model
- cryptographic protocols
- data privacy
- security protocols
- key exchange protocol
- data encryption
- mobile agent system
- stream cipher
- data sharing
- authentication mechanism
- electronic voting
- network security
- identity management
- key agreement protocol
- diffie hellman
- data storage
- authentication protocol
- key distribution
- encryption scheme
- digital signature scheme
- secure communication
- third party
- previously mentioned
- user authentication
- key agreement
- public key encryption
- digital rights management
- key exchange
- physical layer
- authentication scheme
- data transmission
- wireless networks
- trusted computing
- private key
- sensitive information
- electronic payment
- encryption algorithm
- integrity verification
- intrusion detection
- cloud computing