ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security.
Dmytro ProskurinSergiy GnatyukTetiana OkhrimenkoMaksim IavichPublished in: IDAACS (2023)
Keyphrases
- quality assessment
- security properties
- security issues
- encryption key
- security protocols
- smart card
- statistical databases
- high assurance
- homomorphic encryption
- cryptographic protocols
- security mechanisms
- encryption scheme
- authentication protocol
- data security
- image quality
- sensitive data
- key management
- hash functions
- human visual system
- image quality assessment
- privacy preserving
- security requirements
- secret key
- security services
- security analysis
- quality metrics
- privacy concerns
- video quality
- data quality
- information security
- data privacy
- access control
- secure communication
- public key cryptography
- encrypted data
- reduced reference
- private key
- public key
- data sharing
- computational complexity
- perceptual image quality
- biometric template
- digital signature
- personal information
- data analysis