Login / Signup
Towards scalable security analysis using multi-layered security models.
Jin B. Hong
Dong Seong Kim
Published in:
J. Netw. Comput. Appl. (2016)
Keyphrases
</>
security analysis
multi layered
security requirements
high security
smart card
user authentication
security properties
authentication protocol
security model
internet banking
public key
elliptic curve cryptography
mutual authentication
image encryption
private key
security issues
distributed environment