AMIAnalyzer: Security analysis of AMI configurations.
Mohammad Ashiqur RahmanEhab Al-ShaerPublished in: SafeConfig (2011)
Keyphrases
- security analysis
- ambient intelligence
- smart card
- security requirements
- public key
- security properties
- security model
- high security
- software engineering
- image encryption
- encryption scheme
- user authentication
- authentication protocol
- information security
- mutual authentication
- private key
- encryption algorithm
- authentication scheme
- smart grid
- data mining
- proxy signature scheme
- software architecture
- image compression
- database systems
- artificial intelligence