Toward scalable graph-based security analysis for cloud networks.
Abdulhakim SaburAnkur ChowdharyDijiang HuangAdel AlshamraniPublished in: Comput. Networks (2022)
Keyphrases
- security analysis
- security requirements
- smart card
- public key
- high security
- cloud computing
- security properties
- image encryption
- encryption scheme
- lightweight
- authentication protocol
- social networks
- intrusion detection
- encryption algorithm
- user authentication
- computer networks
- authentication scheme
- databases
- mutual authentication