Login / Signup
A Computer Security Model of Imitated Nature Immune and Its FSM.
Zhenpeng Liu
Ailan Li
Dongfang Wang
Wansheng Tang
Published in:
LSMS (1) (2007)
Keyphrases
</>
security model
public key
access control
security requirements
security analysis
security architecture
provably secure
computer systems
public key cryptography
finite state machines
designated verifier
information systems
smart card
case study
encryption scheme
high dimensional data
lightweight
data model