Login / Signup
Homomorphisms and Minimality for Enrich-by-Need Security Analysis.
Daniel J. Dougherty
Joshua D. Guttman
John D. Ramsdell
Published in:
CoRR (2018)
Keyphrases
</>
security analysis
security requirements
smart card
security model
high security
public key
security properties
image encryption
authentication protocol
encryption scheme
encryption algorithm
databases
private key
user authentication
software architecture
wireless sensor networks
real time
mutual authentication