Login / Signup
Context-Based Architectural Security Analysis.
Emre Taspolatoglu
Robert Heinrich
Published in:
WICSA (2016)
Keyphrases
</>
security analysis
security requirements
public key
security properties
smart card
security model
high security
software architecture
image encryption
encryption scheme
authentication protocol
user authentication
proxy signature scheme
encryption algorithm
authentication scheme
mutual authentication