Keyphrases
- information security
- security requirements
- security issues
- security policies
- access control
- network security
- computer security
- security systems
- user experience
- statistical databases
- intrusion detection
- information assurance
- high security
- data mining
- security management
- elliptic curve
- user friendliness
- usability problems
- usability testing
- cryptographic protocols
- authentication protocol
- data security
- security protocols
- security analysis
- security mechanisms
- encryption scheme
- smart card
- network management