Login / Signup
Security Analysis of VPN Configurations in Industrial Control Environments.
Sanaz Rahimi
Mehdi R. Zargham
Published in:
Critical Infrastructure Protection (2011)
Keyphrases
</>
security analysis
public key
security requirements
smart card
high security
image encryption
security model
dynamic environments
security properties
encryption scheme
encryption algorithm
mutual authentication
real time
authentication protocol
network security
computer systems
database systems
data mining