Login / Signup
Security analysis of the SCO-family using key schedules.
Kitae Jeong
Changhoon Lee
Jongsung Kim
Seokhie Hong
Published in:
Inf. Sci. (2009)
Keyphrases
</>
security analysis
high security
private key
image encryption
public key
smart card
encryption scheme
security requirements
authentication protocol
security model
security properties
proxy signature scheme
mutual authentication
database systems
secure communication