Secure computation protocols under asymmetric scenarios in enterprise information system.
Yilei WangMinghao ZhaoYuemei HuYijie GaoXinchun CuiPublished in: Enterp. Inf. Syst. (2021)
Keyphrases
- information systems
- cryptographic protocols
- authentication protocol
- knowledge management
- key distribution
- key exchange
- security analysis
- security properties
- security management
- security protocols
- enterprise information systems
- key agreement protocol
- multi party
- application level
- information management
- business process reengineering
- security services
- private information retrieval
- secure multiparty computation
- management information systems
- knowledge workers
- enterprise wide
- enterprise architecture
- standard model
- mutual authentication
- security mechanisms
- information security
- key establishment
- health care
- databases