Login / Signup

A security model of individual cyberspace.

Alexander AdamovVladimir Hahanov
Published in: EWDTS (2011)
Keyphrases
  • security model
  • access control
  • security requirements
  • public key
  • security analysis
  • security architecture
  • designated verifier
  • provably secure
  • public key cryptography