Login / Signup
Guiding security analysis through visualization.
Lane Harrison
Wenwen Dou
Aidong Lu
William Ribarsky
Xiaoyu Wang
Published in:
IEEE VAST (2011)
Keyphrases
</>
security analysis
public key
high security
smart card
security requirements
security model
data analysis
image encryption
authentication protocol
security properties
encryption scheme
mutual authentication
user authentication
encryption algorithm
similarity measure
databases
private key
low cost