Login / Signup
Cross impact security analysis using the HACKING Game.
Arthur H. Hendela
Murray Turoff
Starr Roxanne Hiltz
Published in:
ISCRAM (2010)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
mutual authentication
security model
security properties
image encryption
authentication protocol
user authentication
encryption algorithm
encryption scheme
authentication scheme
security threats
proxy signature scheme