Keyphrases
- digital signature scheme
- high security
- identity based cryptography
- real world
- intrusion detection
- security issues
- authentication protocol
- key distribution
- protection scheme
- security problems
- authentication scheme
- security analysis
- network security
- information security
- key management
- secure communication
- diffie hellman
- key agreement
- elliptic curve cryptography
- wireless local area network
- chosen plaintext
- ring signature scheme
- electronic voting
- public key encryption
- graphical password
- key exchange
- secret sharing
- secret sharing scheme
- security model
- access control
- data mining