Keyphrases
- information security
- encryption algorithms
- security issues
- information assurance
- cellular automata
- intrusion detection
- information systems
- public key cryptography
- security requirements
- countermeasures
- access control
- security level
- cryptographic protocols
- security policies
- cryptographic algorithms
- data security
- high security
- network security
- security mechanisms
- security analysis
- elliptic curve cryptography
- security systems
- security problems
- data sets
- smart card
- security services
- security management
- user authentication
- security protocols
- encryption scheme
- functional requirements
- data storage