Login / Signup
Spying on the Spy: Security Analysis of Hidden Cameras.
Samuel Herodotou
Feng Hao
Published in:
CoRR (2023)
Keyphrases
</>
security analysis
public key
smart card
security requirements
high security
security model
security properties
authentication protocol
image encryption
encryption scheme
authentication scheme
user authentication
mutual authentication
database systems
encryption algorithm
proxy signature scheme