Login / Signup
Identifying OS Kernel Objects for Run-Time Security Analysis.
Amani S. Ibrahim
James H. Hamlyn-Harris
John Grundy
Mohamed Almorsy
Published in:
NSS (2012)
Keyphrases
</>
security analysis
public key
smart card
security requirements
operating system
data objects
security properties
image encryption
authentication protocol
user authentication
encryption scheme
authentication scheme
high security
information systems
mutual authentication