A security analysis of police computer systems.
Benjamin VanderSlootStuart WheatonJ. Alex HaldermanPublished in: PST (2016)
Keyphrases
- security analysis
- computer systems
- smart card
- data processing
- public key
- operating system
- security requirements
- high security
- computing systems
- information processing systems
- information systems
- authentication protocol
- communication systems
- encryption scheme
- human beings
- computer networks
- user authentication
- mutual authentication
- high end
- metadata
- data management