Elliptic Curve Cryptography For EAACK Intrusion Detection System.
Tejas SaveReeta ChhataniPublished in: ICCCT (2015)
Keyphrases
- intrusion detection system
- elliptic curve cryptography
- intrusion detection
- elliptic curve
- public key
- authentication scheme
- security analysis
- network security
- computer networks
- anomaly detection
- digital watermark
- error correction
- high security
- network traffic
- public key cryptography
- distributed intrusion detection
- computer systems
- data analysis
- database
- digital signature
- security requirements
- smart card