Login / Signup
Intelligent Cyber Security Analysis in Enterprise Networks.
Jason H. Li
Renato Levy
Peng Liu
Published in:
AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems (2007)
Keyphrases
</>
security analysis
security requirements
public key
smart card
high security
authentication protocol
intelligent systems
security model
security properties
encryption scheme
cyber security
authentication scheme
image encryption
power consumption
user authentication
proxy signature scheme