Session details: Lock it Down! Security, Countermeasures, and Authentication.
Bozidar RadunovicPublished in: MobiCom (2018)
Keyphrases
- countermeasures
- information security
- security measures
- security requirements
- user authentication
- security mechanisms
- cyber attacks
- security issues
- java card
- security breaches
- smart card
- intrusion detection
- security level
- security analysis
- fuzzy vault
- identity authentication
- authentication mechanism
- information systems
- computer security
- network security
- authentication protocol
- data encryption
- information warfare
- security threats
- data security
- authentication scheme
- integrity verification
- biometric authentication
- biometric data
- security management
- encryption decryption
- virtual private network
- session initiation protocol
- e government
- authentication systems
- power analysis
- security policies
- security services
- sensitive data
- operating system
- databases
- identity management
- security model