Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance.
Alexander V. UskovPublished in: TrustCom (2012)
Keyphrases
- information security
- network security
- encryption algorithms
- user authentication
- security requirements
- image encryption
- data encryption
- authentication scheme
- smart card
- security analysis
- encryption algorithm
- security issues
- authentication protocol
- virtual private network
- intrusion detection
- security mechanisms
- information systems
- security policies
- security level
- e government
- information security management
- smart grid
- biometric data
- international standards
- anomaly detection
- sensor networks
- secret key
- data security
- sensitive data
- data storage
- communication networks
- data mining techniques