Encryption, Electronic Signatures and Security in Computer Communications.
T. R. N. RaoPublished in: ICCCN (1997)
Keyphrases
- encryption algorithms
- security properties
- key management
- digital signature
- encryption scheme
- encryption decryption
- high security
- data encryption
- identity authentication
- security analysis
- security requirements
- anti virus
- encryption algorithm
- key exchange
- computer security
- network security
- data confidentiality
- computer systems
- virtual private network
- digital rights management
- network management
- security mechanisms
- access control
- public key cryptography
- private key
- malware detection
- signature scheme
- intrusion detection
- elliptic curve cryptography
- information security
- communication systems
- stream cipher
- cryptographic protocols
- integrity verification
- elliptic curve
- group communication
- image encryption
- data security
- data integrity
- electronic transactions
- electronic commerce
- public key infrastructure
- security protocols
- ad hoc networks
- ciphertext
- provably secure
- security policies
- statistical databases
- standard model
- security model
- security issues
- key distribution