Keyphrases
- information security
- user authentication
- authentication mechanism
- security issues
- access control
- information assurance
- security level
- statistical databases
- intrusion detection
- authentication systems
- password based authenticated key exchange
- password authentication
- graphical password
- network security
- computer security
- security problems
- security requirements
- data encryption
- security systems
- functional requirements
- security measures
- key exchange protocol
- smart card
- network management
- sensitive data
- human operators
- security threats
- encryption scheme
- data security
- security protocols