Private key infrastructure: balancing computer transmission privacy with changing technology and security demands.
Donna M. EvansDavid C. YenPublished in: Comput. Stand. Interfaces (2005)
Keyphrases
- private key
- mutual authentication
- public key
- security analysis
- security issues
- statistical databases
- privacy protection
- computer systems
- authentication protocol
- signature scheme
- key distribution
- digital signature
- security properties
- privacy preserving
- security services
- encryption scheme
- secret key
- security mechanisms
- signcryption scheme
- ciphertext
- secret sharing scheme
- smart card
- security policies
- cost effective
- key management
- security protocols
- security requirements
- ad hoc networks
- information security
- rfid systems