Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services.
Jen-Chieh LaiChia-Hui WangPublished in: PSIVT (2006)
Keyphrases
- data encryption
- data protection
- virtual private network
- encryption algorithms
- human operators
- identity authentication
- encryption scheme
- private key
- public key infrastructure
- security properties
- mobile commerce
- key management
- network services
- encryption decryption
- personal data
- security services
- user privacy
- protection mechanisms
- secret key
- encryption algorithm
- control system
- security requirements
- high security
- web services
- intrusion detection
- hash functions
- data security
- information security
- public key
- service management
- digital rights management
- identity management
- integrity verification
- access control
- network security
- stream cipher
- elliptic curve cryptography
- key exchange
- security analysis
- cryptographic protocols
- service providers
- public key cryptography
- key agreement
- digital signature
- ciphertext
- diffie hellman
- digital content
- cyber physical systems
- image encryption
- signature scheme
- security mechanisms