Software Security Analysis Based on the Principle of Defense-in-Depth.
Ahmad JalaliMohammad Ali HadaviPublished in: ISCISC (2018)
Keyphrases
- security analysis
- defense mechanisms
- security requirements
- smart card
- public key
- security model
- software architecture
- high security
- encryption scheme
- software systems
- security properties
- software development
- image encryption
- network security
- information security
- encryption algorithm
- mutual authentication
- intrusion detection
- source code
- case study
- video sequences
- authentication scheme
- computer systems
- similarity measure