ADTool: Security Analysis with Attack-Defense Trees.
Barbara KordyPiotr KordySjouke MauwPatrick SchweitzerPublished in: QEST (2013)
Keyphrases
- security analysis
- defense mechanisms
- encryption algorithm
- security requirements
- authentication protocol
- high security
- public key
- smart card
- security model
- key exchange
- image encryption
- security properties
- tree structure
- encryption scheme
- mutual authentication
- private key
- authentication scheme
- ddos attacks
- countermeasures
- user authentication
- access control