Keyphrases
- security issues
- identity management
- security requirements
- genetic algorithm
- search engine
- social networks
- case study
- key management
- cryptographic protocols
- user authentication
- integrity verification
- real time
- scalar product
- covert channel
- stream cipher
- security properties
- security protocols
- security analysis
- highly efficient
- lightweight
- information systems
- machine learning
- neural network
- data sets