Who do you trust? Beyond encryption, secure e-business.
Mathias KlangPublished in: Decis. Support Syst. (2001)
Keyphrases
- key management
- key exchange
- public key infrastructure
- encryption scheme
- security services
- digital signature
- data encryption
- public key cryptography
- security properties
- cryptographic protocols
- stream cipher
- security analysis
- business partners
- trusted computing
- encryption decryption
- trust model
- electronic business
- security protocols
- electronic transactions
- data confidentiality
- public key
- security requirements
- cryptographic algorithms
- data protection
- integrity verification
- private key
- digital rights management
- advanced encryption standard
- high security
- business models
- elliptic curve cryptography
- diffie hellman
- secure communication
- smart card
- trust relationships
- image encryption
- key distribution
- data security
- security mechanisms
- authentication scheme
- resource constrained
- encryption algorithm
- security issues
- standard model
- elliptic curve
- security model
- mutual authentication
- service quality
- personal information
- block cipher
- user authentication
- business processes
- service providers