Security analysis of SITAR intrusion tolerance system.
Dazhi WangBharat B. MadanKishor S. TrivediPublished in: SSRS@CCS (2003)
Keyphrases
- security analysis
- intrusion detection
- smart card
- intrusion detection system
- public key
- security requirements
- network security
- high security
- image encryption
- security properties
- security model
- authentication protocol
- user authentication
- anomaly detection
- mutual authentication
- authentication scheme
- encryption scheme
- privacy preserving
- computer networks
- proxy signature scheme