Security analysis of C-BGP: A light alternative to S-BGP.
Junaid IsrarYoussef GahiMouhcine GuennounHussein T. MouftahPublished in: CCECE (2016)
Keyphrases
- security analysis
- anomaly detection
- smart card
- public key
- security requirements
- security properties
- encryption scheme
- authentication protocol
- security model
- proxy signature scheme
- mutual authentication
- image encryption
- user authentication
- high security
- databases
- encryption algorithm
- authentication scheme
- intrusion detection system
- data mining