Bring your own encryption: balancing security with practicality.
Hongwen ZhangPublished in: Netw. Secur. (2015)
Keyphrases
- encryption algorithms
- security properties
- encryption scheme
- key management
- encryption decryption
- high security
- data encryption
- encryption algorithm
- key exchange
- security analysis
- virtual private network
- identity authentication
- data confidentiality
- digital rights management
- information security
- elliptic curve cryptography
- access control
- security requirements
- cryptographic algorithms
- security issues
- data security
- advanced encryption standard
- cryptographic protocols
- web applications
- intrusion detection
- digital signature
- security mechanisms
- secret key
- integrity verification
- public key cryptography
- stream cipher
- operating system
- database systems
- security level
- ad hoc networks
- visual basic
- security policies
- statistical databases
- public key infrastructure
- mutual authentication
- security protocols
- network communication
- key distribution
- private key
- data protection