Keyphrases
- information security
- encryption algorithms
- public key cryptography
- security issues
- information assurance
- cryptographic algorithms
- security requirements
- elliptic curve cryptography
- security systems
- cellular automata
- intrusion detection
- security policies
- access control
- public key
- key management
- security analysis
- high security
- data mining
- malware detection
- computer security
- network management
- smart card
- security measures
- cryptographic protocols
- functional requirements
- neural network
- probability ranking principle