Using public-key infrastructures for security and risk management.
Paul WingBrian O'HigginsPublished in: IEEE Commun. Mag. (1999)
Keyphrases
- risk management
- public key
- public key cryptosystem
- security model
- private key
- security analysis
- public key cryptography
- risk assessment
- risk analysis
- elliptic curve cryptography
- critical infrastructure
- diffie hellman
- encryption scheme
- authentication protocol
- digital signature
- public key infrastructure
- decision support system
- information security management
- blind signature scheme
- provably secure
- authentication scheme
- public key encryption
- blind signature
- secure communication
- signature scheme
- secret key
- image authentication
- cca secure
- rfid tags
- identity based encryption
- high security
- signcryption scheme
- project management
- standard model
- proxy re encryption
- network security
- elliptic curve
- lightweight
- software projects
- information security
- security issues