Perceptions of Security Contributing to the Implementation of Secure IS.
Theodore TryfonasEvangelos A. KiountouzisPublished in: SEC (2003)
Keyphrases
- security requirements
- security issues
- security measures
- security level
- key management
- information security
- data encryption
- security mechanisms
- security analysis
- authentication protocol
- security management
- mobile agent system
- security architecture
- security properties
- diffie hellman
- data security
- security protocols
- encryption scheme
- trusted computing
- key agreement protocol
- security services
- public key encryption
- rfid systems
- wireless sensor networks
- digital signature scheme
- advanced encryption standard
- authentication mechanism
- cryptographic algorithms
- network security
- security patterns
- sensitive data
- cryptographic protocols
- authentication scheme
- high security
- information leakage
- elliptic curve
- security model
- electronic voting
- key agreement
- private key
- integrity verification
- identity management