Keyphrases
- big data
- private key
- public key
- management system
- secret key
- cloud computing
- signature scheme
- key management
- key distribution
- digital signature
- elliptic curve
- security analysis
- key exchange
- public key cryptography
- modular exponentiation
- location information
- data management
- elliptic curve cryptography
- data sets
- digital signature scheme
- cryptographic algorithms
- smart objects
- ciphertext
- mobile computing
- ubiquitous computing
- functional dependencies
- integrity constraints
- knowledge discovery
- social media
- data analysis
- social networks