Two step verification system of highly secure social media: Possible to breach the security.
Md. Mizanur RahmanMuhammad Abdullah AdnanPublished in: NSysS (2017)
Keyphrases
- social media
- integrity verification
- sensitive data
- cryptographic protocols
- high security
- security issues
- security requirements
- security mechanisms
- security analysis
- security level
- security measures
- security properties
- security protocols
- information security
- data encryption
- security services
- key management
- security management
- security patterns
- personal information
- stream cipher
- authentication protocol
- java card
- security architecture
- key exchange protocol
- public key encryption
- data security
- model checking
- previously mentioned
- access control
- security policies
- mobile agent system
- personal data
- privacy preserving
- identity management
- data storage
- key agreement protocol
- high assurance
- social networks
- key exchange
- trusted computing
- unauthorized access
- digital rights management
- electronic voting
- authentication mechanism
- digital signature scheme
- intrusion detection
- authentication scheme
- standard model
- security model
- third party
- smart card
- network security
- provably secure
- data sharing
- private information
- secure communication
- encryption scheme
- countermeasures
- private key