Login / Signup
Towards Usable Security Analysis Tools for Trigger-Action Programming.
McKenna McCall
Eric Zeng
Faysal Hossain Shezan
Mitchell Yang
Lujo Bauer
Abhishek Bichhawat
Camille Cobb
Limin Jia
Yuan Tian
Published in:
SOUPS (2023)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
security model
security properties
image encryption
user authentication
encryption scheme
authentication protocol
encryption algorithm
proxy signature scheme