Flexible, extensible Java security using digital signatures.
Dan S. WallachJim A. RoskindEdward W. FeltenPublished in: Network Threats (1996)
Keyphrases
- digital signature
- security mechanisms
- key management
- smart card
- data integrity
- public key
- private key
- elliptic curve
- security issues
- public key cryptography
- security requirements
- blind signature scheme
- lightweight
- information security
- object oriented
- trusted third party
- access control
- security model
- blind signature
- resource constrained
- security analysis
- network security
- data model
- database design
- signature scheme
- security properties
- rfid tags
- wireless sensor networks
- key distribution
- data storage
- intrusion detection
- security policies
- digital watermarking
- operating system
- security protocols
- signal processing
- secret key
- database systems
- databases