Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information.
Aamir ShahzadMalrey LeeYoung Keun LeeSuntae KimNaixue XiongJae-Young ChoiYoung-Hwa ChoPublished in: Symmetry (2015)
Keyphrases
- sensitive information
- real time
- sensitive data
- cryptographic protocols
- data privacy
- information security
- confidential information
- third party
- privacy preserving
- privacy issues
- cryptographic algorithms
- information leakage
- security protocols
- authentication protocol
- malicious users
- privacy preservation
- data protection
- personal data
- private information
- user privacy
- intrusion detection
- security analysis
- security model
- privacy preserving data publishing
- protect sensitive
- key agreement protocol
- credit card
- smart card
- data security
- medical records
- security requirements
- diffie hellman
- provably secure
- privacy protection
- public key cryptography
- personal information
- original data
- elliptic curve cryptography
- access control
- public key
- image data
- feature selection