A systematic approach for encryption and authentication with fault tolerance.
Chang N. ZhangChunren LaiPublished in: Comput. Networks (2004)
Keyphrases
- fault tolerance
- fault tolerant
- encryption decryption
- identity authentication
- data encryption
- public key cryptography
- integrity verification
- image authentication
- virtual private network
- distributed computing
- high availability
- security analysis
- load balancing
- distributed systems
- response time
- key distribution
- secret key
- database replication
- public key
- single point of failure
- group communication
- mobile agents
- peer to peer
- failure recovery
- authentication protocol
- private key
- fault management
- replicated databases
- authentication scheme
- key management
- encryption scheme
- multi agent systems
- digital signature
- data sets
- security mechanisms
- component failures
- wireless sensor networks