ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis.
Jeff WilsonJudith M. BrownRobert BiddlePublished in: SIW@CCS (2014)
Keyphrases
- security analysis
- public key
- security requirements
- smart card
- high security
- security properties
- distributed systems
- proxy signature scheme
- encryption algorithm
- authentication protocol
- encryption scheme
- distributed environment
- computer networks
- multi agent
- quadtree
- data integration
- image encryption
- data mining
- databases