Cryptography and Middleware Security.
Ulrich LangDieter GollmannRudolf SchreinerPublished in: ICICS (2001)
Keyphrases
- information security
- encryption algorithms
- security issues
- security policies
- cryptographic algorithms
- security requirements
- intrusion detection
- computer security
- ubiquitous computing environments
- cellular automata
- smart card
- network security
- statistical databases
- public key cryptography
- security level
- access control
- elliptic curve cryptography
- security problems
- security mechanisms
- low level
- public key
- cryptographic protocols
- information systems
- security threats
- biometric systems
- data encryption
- context awareness
- e government
- lightweight