Continuous Encryption Functions for Security Over Networks.
Yingbo HuaAhmed MaksudPublished in: CoRR (2021)
Keyphrases
- encryption scheme
- encryption decryption
- encryption algorithms
- key management
- identity authentication
- high security
- security properties
- encryption algorithm
- data encryption
- security analysis
- continuous functions
- elliptic curve cryptography
- private key
- data protection
- digital rights management
- public key cryptography
- key exchange
- complex networks
- intrusion detection
- cryptographic protocols
- virtual private network
- network structure
- security protocols
- information security
- network security
- social networks
- enterprise network
- computer networks
- data confidentiality
- digital signature
- security issues
- data security
- statistical databases
- public key infrastructure
- secret key
- security mechanisms
- cryptographic algorithms
- image encryption
- access control
- elliptic curve