Login / Signup

Methodology for security analysis of data-processing systems.

John M. CarrollOi-Lun Wu
Published in: Comput. Secur. (1983)
Keyphrases
  • security analysis
  • data processing
  • smart card
  • security requirements
  • computer systems
  • database
  • multi agent systems
  • network traffic
  • public key
  • encryption scheme
  • image encryption