Capabilities and Encryption: The Ultimate Defense Against Security Attacks ?
Bernd FreislebenP. KammererJames Leslie KeedyPublished in: Security and Persistence (1990)
Keyphrases
- defense mechanisms
- stream cipher
- cryptographic protocols
- security threats
- security properties
- network security
- security protocols
- advanced encryption standard
- cyber attacks
- security mechanisms
- cyber defense
- cryptographic algorithms
- key management
- security problems
- encryption algorithms
- intrusion detection
- security analysis
- encryption decryption
- countermeasures
- security measures
- encryption scheme
- information security
- computer security
- high security
- ddos attacks
- denial of service attacks
- dos attacks
- security risks
- security vulnerabilities
- elliptic curve cryptography
- chosen plaintext
- security requirements
- digital signature
- data encryption
- virtual private network
- block cipher
- security issues
- encryption algorithm
- java card
- secret key
- cyber security
- malicious users
- resource constrained
- access control
- smart card
- security policies
- intrusion detection system
- integrity verification
- sql injection
- wireless sensor networks
- malicious nodes
- digital rights management
- data security
- data protection
- rfid tags
- watermarking algorithm
- digital watermark
- buffer overflow
- key exchange
- standard model
- security model
- malware detection
- ciphertext