Outsourcing Security Analysis with Anonymized Logs.
Jianqing ZhangNikita BorisovWilliam YurcikPublished in: SecureComm (2006)
Keyphrases
- security analysis
- security requirements
- public key
- security properties
- privacy preserving
- smart card
- high security
- service providers
- information loss
- authentication protocol
- information systems
- image encryption
- encryption scheme
- business process
- user authentication
- privacy protection
- sensitive information
- mutual authentication
- similarity measure