Keyphrases
- oriented programming
- security threats
- security mechanisms
- security problems
- security measures
- security protocols
- computer security
- cyber attacks
- java card
- security issues
- countermeasures
- denial of service attacks
- security risks
- information security
- security breaches
- security flaws
- security vulnerabilities
- stream cipher
- fault injection
- security requirements
- malicious attacks
- object oriented
- chosen plaintext
- security management
- cryptographic protocols
- malicious users
- network security
- identity theft
- insider attacks
- access control
- smart card
- key management
- security policies
- block cipher
- intrusion detection
- malicious nodes
- biometric template
- secure routing
- intrusion detection system
- unauthorized access
- security analysis
- buffer overflow
- intrusion detection and prevention
- database
- databases
- sql injection
- dos attacks
- multi agent
- wireless sensor networks
- anomaly detection
- encryption scheme
- cyber security