TPM Based Schema for Reinforcing Security in IBE's Key Manager.
Zakaria IgarramenAhmed BentajerMustapha HedabouPublished in: MEDI Workshops (2019)
Keyphrases
- high security
- trusted computing
- network security
- encryption scheme
- information security
- databases
- data model
- security requirements
- management system
- access control
- secure communication
- security issues
- trusted platform module
- cca secure
- image encryption
- private key
- security policies
- intrusion detection
- security protocols
- security analysis
- computer security
- statistical databases
- relational databases
- database systems