Cryptanalysis of Lee and Chang's ID-based information security functions.
Wei-Hua HeTzong-Chen WuPublished in: Comput. Commun. (1999)
Keyphrases
- information security
- countermeasures
- security issues
- information systems
- intrusion detection
- smart card
- security requirements
- signature scheme
- information assurance
- network security
- cyber defense
- smart grid
- e government
- sensitive data
- risk analysis
- security level
- information security management
- risk assessment
- data mining
- secret key
- decision making
- e learning
- intrusion detection system
- technical issues
- design theory
- data analysis