Cryptographically Secure Shield for Security IPs Protection.
Xuan Thuy NgoJean-Luc DangerSylvain GuilleyTarik GrabaYves MathieuZakaria NajmShivam BhasinPublished in: IEEE Trans. Computers (2017)
Keyphrases
- security level
- information security
- security architecture
- security issues
- security requirements
- previously mentioned
- data protection
- data confidentiality
- security mechanisms
- protection mechanisms
- sensitive data
- security policies
- access control
- data security
- security model
- security measures
- protection scheme
- key management
- data encryption
- security management
- security analysis
- electronic voting
- cryptographic protocols
- security properties
- secret key
- authentication protocol
- smart card
- security services
- security patterns
- intrusion detection
- identity management
- biometric data
- rfid systems
- network security
- integrity verification
- key exchange protocol
- security protocols
- public key encryption
- data integrity
- stream cipher
- key agreement protocol
- critical infrastructure
- computer security
- privacy protection
- authentication mechanism
- rfid tags
- key distribution
- protection schemes
- private key
- personal data
- key agreement
- authentication scheme