Login / Signup
An Approach for Network Security Analysis Using Logic Exploitation Graph.
Handong Mao
Weiming Zhang
Published in:
CIT (2007)
Keyphrases
</>
security analysis
public key
security requirements
image encryption
smart card
high security
network structure
security model
authentication scheme
encryption scheme
databases
computer networks
lightweight
low cost
user authentication
security properties
knn