Model-based privacy and security analysis with CARiSMA.
Amir Shayan AhmadianSven PeldszusQusai RamadanJan JürjensPublished in: ESEC/SIGSOFT FSE (2017)
Keyphrases
- security analysis
- security properties
- mutual authentication
- authentication protocol
- security requirements
- public key
- smart card
- high security
- encryption scheme
- privacy protection
- private information
- privacy preserving
- image encryption
- personal information
- rfid systems
- rfid tags
- encryption algorithm
- high dimensional
- security mechanisms
- user authentication
- security services
- access control
- wireless sensor networks