Keyphrases
- user authentication
- security issues
- stream cipher
- cryptographic protocols
- security analysis
- data sets
- security level
- security requirements
- machine learning
- sensitive data
- security mechanisms
- key management
- low cost
- security protocols
- wireless sensor networks
- information systems
- group communication
- security management
- diffie hellman
- security measures
- database
- data encryption