Security Analysis of Information Systems Taking into Account Social Engineering Attacks.
Igor V. KotenkoMikhail StepashkinElena DoynikovaPublished in: PDP (2011)
Keyphrases
- security analysis
- information systems
- stream cipher
- password guessing
- smart card
- security requirements
- high security
- public key
- defense mechanisms
- security model
- image encryption
- security mechanisms
- social networks
- information security
- encryption scheme
- mutual authentication
- artificial intelligence
- countermeasures
- software engineering
- security properties
- authentication scheme
- ddos attacks
- encryption algorithm
- computer systems
- knowledge management
- authentication protocol
- elliptic curve cryptography
- data model
- security protocols
- fine grained
- databases