Cyberwarfare
Data modeling
Public-key cryptography
Access control
Key
Two-man rule
Unique key
Function key
Digital signature
Security
Key management
Cryptography