PHY-layer security is no alternative to cryptography.
Pieter RobynsPeter QuaxWim LamottePublished in: WISEC (2017)
Keyphrases
- information security
- encryption algorithms
- security issues
- access control
- elliptic curve cryptography
- security requirements
- information assurance
- cellular automata
- public key cryptography
- multi layer
- security policies
- network security
- statistical databases
- high security
- computer security
- security measures
- network layer
- intrusion detection
- information systems
- security analysis
- security systems
- security level
- cryptographic protocols
- security mechanisms
- image encryption
- security threats
- database systems
- cryptographic algorithms
- smart card
- rfid tags
- public key
- security management
- encryption scheme
- security properties
- application layer
- cyber security
- data mining
- key management