Keyphrases
- digital signature scheme
- elliptic curve cryptography
- key exchange
- security requirements
- signature scheme
- private key
- elliptic curve
- information security
- security policies
- cryptographic algorithms
- public key
- public key cryptography
- network security
- statistical databases
- intrusion detection
- security properties
- access control
- discrete geometry
- security systems
- security model
- security issues
- information systems
- authentication protocol
- security analysis
- computer security
- hamming distance