Login / Signup
A Logic-Reasoning Approach to Network Security Analysis.
Handong Mao
Aihua Bao
Chen Feng
Weiming Zhang
Published in:
SKG (2007)
Keyphrases
</>
security analysis
public key
security requirements
smart card
security model
high security
bit rate
authentication protocol
image encryption
data mining techniques
network traffic
computer networks
encryption scheme
security properties
proxy signature scheme