Cryptographic equipment security: a code of practice.
Stephen C. SerpellPublished in: Comput. Secur. (1985)
Keyphrases
- security protocols
- key management
- security properties
- encryption scheme
- elliptic curve cryptography
- stream cipher
- security requirements
- cryptographic protocols
- fuzzy vault
- smart card
- random number generator
- encryption decryption
- security mechanisms
- access control
- high assurance
- secure communication
- information security
- statistical databases
- source code
- intrusion detection
- cryptographic algorithms
- public key cryptography
- security issues
- security services
- security vulnerabilities
- public key
- network security
- advanced encryption standard
- security analysis
- protection scheme
- resource constrained
- security systems
- operating system
- encryption key
- digital signature