Keyphrases
- key management
- security requirements
- security issues
- security mechanisms
- security problems
- security level
- security protocols
- information security
- security measures
- access control
- key exchange
- data security
- security properties
- security management
- data encryption
- electronic voting
- integrity verification
- security patterns
- factor authentication
- digital signature scheme
- rfid systems
- security model
- sensitive data
- intrusion detection
- cloud computing
- cryptographic protocols
- security services
- security architecture
- trusted computing
- key distribution
- security policies
- key management scheme
- authentication mechanism
- data management
- secure routing
- management system