Secure storage - Confidentiality and authentication.
Ryad BenadjilaLouiza KhatiDamien VergnaudPublished in: Comput. Sci. Rev. (2022)
Keyphrases
- data encryption
- data confidentiality
- authentication mechanism
- identity management
- authentication scheme
- access control
- security mechanisms
- user authentication
- authentication protocol
- data storage
- security requirements
- security analysis
- password authentication
- security properties
- key distribution
- integrity verification
- factor authentication
- secure manner
- user privacy
- information security
- information leakage
- smart card
- data quality
- secure communication
- rights management
- data security
- key agreement
- public key cryptography
- security protocols
- encryption decryption
- identity authentication
- security issues
- public key
- key management
- mutual authentication
- key agreement protocol
- secret key
- data integrity
- electronic payment
- security model
- security policies
- operating system
- cloud computing
- rfid tags
- lightweight
- sensitive data
- trusted third party
- diffie hellman
- resource constrained
- biometric authentication
- cryptographic protocols