A methodology for the structured security analysis of interconnections.
Daniel BoonstraHarm A. SchotanusCor A. A. VerkoelenAndre C. M. SmuldersPublished in: MILCOM (2011)
Keyphrases
- security analysis
- security requirements
- high security
- public key
- smart card
- security properties
- image encryption
- authentication protocol
- mutual authentication
- encryption scheme
- security model
- proxy signature scheme
- authentication scheme
- user authentication
- encryption algorithm
- fine grained
- data access
- peer to peer
- databases