Keyphrases
- cca secure
- public key encryption
- encryption scheme
- proxy re encryption
- security analysis
- public key cryptosystem
- intrusion detection
- security model
- access control
- digital signature scheme
- authentication scheme
- secret sharing scheme
- information security
- ciphertext
- security issues
- elliptic curve
- high security
- mobile devices
- elliptic curve cryptography
- private key
- key technologies
- secure communication
- key exchange
- key distribution
- ubiquitous computing
- network security
- rfid technology
- ring signature scheme
- identity based encryption
- anomaly detection
- authentication protocol