Keyphrases
- information security
- access control
- security policies
- network security
- security threats
- security issues
- intrusion detection
- network services
- network management
- security requirements
- computer security
- mobile devices
- wireless sensor
- security systems
- elliptic curve
- data security
- functional requirements
- mobile agent system
- security vulnerabilities
- information assurance
- homomorphic encryption
- security level
- key management
- cyber attacks
- security model
- cyber security
- smart phones
- computer networks
- mobile phone
- low cost
- wireless sensor networks