Enhancing the Security and Efficiency of 3-D Secure.
Mohammed AssoraAyoub ShirvaniPublished in: ISC (2006)
Keyphrases
- security level
- security issues
- security requirements
- security measures
- security management
- key management
- security mechanisms
- security analysis
- security protocols
- security properties
- electronic voting
- high security
- information security
- data security
- access control
- cryptographic protocols
- security policies
- key exchange protocol
- key agreement protocol
- user authentication
- network security
- diffie hellman
- sensitive data
- encryption scheme
- identity management
- covert channel
- security architecture
- trusted computing
- countermeasures
- smart card
- authentication mechanism
- unauthorized access
- stream cipher
- public key infrastructure
- data encryption
- secure routing
- integrity verification
- information leakage
- security patterns
- key exchange
- secure communication
- security model
- intrusion detection