Implementation of ID-based Audit Protocols to Enhance Security and Productivity.
R. HariharanG. KomarasamyS. Daniel Madan RajaPublished in: Comput. Syst. Sci. Eng. (2023)
Keyphrases
- key distribution
- intrusion detection
- key management
- authentication protocol
- key agreement protocol
- security protocols
- access control
- application level
- diffie hellman
- communication protocols
- security services
- encryption scheme
- key exchange
- higher throughput
- blind signature scheme
- blind signature
- data mining
- cryptographic protocols
- information security
- security model
- secure communication
- security requirements
- network security
- wireless networks
- database systems
- information systems