Automatic security analysis using security metrics.
Kun SunSushil JajodiaJason H. LiYi ChengWei TangAnoop SinghalPublished in: MILCOM (2011)
Keyphrases
- security analysis
- security requirements
- high security
- security properties
- security model
- internet banking
- public key
- smart card
- mutual authentication
- encryption scheme
- authentication protocol
- image encryption
- encryption algorithm
- private key
- elliptic curve cryptography
- key exchange
- user authentication
- security policies
- information security
- authentication scheme
- software development
- secure electronic
- diffie hellman