Correction to "Security Requirements and Protocols for a Broadcast Scenario".
Stephen T. KentPublished in: IEEE Trans. Commun. (1981)
Keyphrases
- security requirements
- security properties
- secure electronic
- concurrency control protocols
- security protocols
- security analysis
- smart card
- information security
- security mechanisms
- security policies
- security problems
- access control
- security concerns
- security model
- software architecture
- timing constraints
- security patterns
- authentication protocol
- mobile commerce
- reference models
- real time databases
- diffie hellman
- cryptographic protocols
- covert channel
- real world
- information systems