Login / Signup
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes.
Michael A. Schumann
Doron Drusinsky
James Bret Michael
Duminda Wijesekera
Published in:
IEEE Trans. Software Eng. (2014)
Keyphrases
</>
security analysis
decision making
public key
smart card
security requirements
security model
high security
image encryption
authentication scheme
authentication protocol
security properties
user authentication
data mining
encryption scheme
access control policies