Keyphrases
- security protocols
- security properties
- key management
- encryption scheme
- security requirements
- smart card
- cryptographic protocols
- information security
- high assurance
- encryption decryption
- access control
- fuzzy vault
- network security
- elliptic curve cryptography
- cryptographic algorithms
- random number generator
- intrusion detection
- secure communication
- security analysis
- high security
- encryption key
- security mechanisms
- public key cryptography
- stream cipher
- data security
- security policies
- packet filtering
- random number
- security services
- authentication scheme
- functional modules
- security systems
- security model
- junction tree
- statistical databases