Implementing generic security requirements in e-voting using modified stegano-cryptographic approach.
Olayemi M. OlaniyiOladiran T. ArulogunOluwasayo E. OmidioraOladotun Olusola OkediranPublished in: Int. J. Inf. Comput. Secur. (2015)
Keyphrases
- security requirements
- smart card
- security properties
- security analysis
- security protocols
- information security
- security mechanisms
- security concerns
- access control
- security model
- reference models
- security problems
- security patterns
- mobile commerce
- digital signature
- secure communication
- secure electronic
- software architecture
- authentication scheme
- secret key
- security policies
- covert channel
- authentication protocol
- requirements engineering
- information systems
- high level
- databases