Keyphrases
- high speed
- data acquisition
- public key cryptography
- trusted platform module
- cellular automata
- low power
- real time
- mobile devices
- virtual private network
- elliptic curve cryptography
- biometric authentication
- key technologies
- data encryption
- authentication mechanism
- security mechanisms
- high speed networks
- fragile watermarking
- elliptic curve
- physical world
- public key
- authentication protocol
- user authentication
- security analysis
- resource constrained
- information asymmetry
- electronic payment
- rfid tags
- information security
- smart card
- peer to peer