Keyphrases
- key management
- signcryption scheme
- security properties
- standard model
- information security
- key management scheme
- trusted third party
- ring signature
- electronic voting
- private key
- security requirements
- encryption scheme
- security issues
- security threats
- security systems
- access control
- formal model
- security model
- public key
- wireless sensor networks
- key distribution
- network security
- ad hoc networks
- data integrity
- intrusion detection
- security analysis
- sensitive data
- database systems
- information systems