Login / Signup
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models.
Simon Yusuf Enoch
Jin B. Hong
Dong Seong Kim
Published in:
TrustCom/BigDataSE (2018)
Keyphrases
</>
security analysis
dynamic networks
high security
security requirements
security properties
smart card
public key
security model
mutual authentication
encryption scheme
image encryption
database systems
security mechanisms
encryption algorithm
user authentication
software systems
knowledge discovery
social networks