Visualization of web form submissions for security analysis.
Tran Tri DangTran Khanh DangPublished in: Int. J. Web Inf. Syst. (2013)
Keyphrases
- security analysis
- high security
- smart card
- security requirements
- public key
- security model
- user authentication
- data analysis
- encryption scheme
- encryption algorithm
- security properties
- image encryption
- authentication protocol
- proxy signature scheme
- databases
- mutual authentication
- similarity search
- low cost
- information systems