ADTool: Security Analysis with Attack- Defense Trees (Extended Version)
Barbara KordyPiotr KordySjouke MauwPatrick SchweitzerPublished in: CoRR (2013)
Keyphrases
- security analysis
- defense mechanisms
- authentication protocol
- encryption algorithm
- smart card
- public key
- security requirements
- ddos attacks
- security model
- image encryption
- key exchange
- user authentication
- security properties
- encryption scheme
- secret key
- high security
- tree structure
- authentication scheme
- network security
- password guessing