Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Jeremy W. BryansLin Shen LiewHoang Nga NguyenGiedre SabaliauskaiteSiraj Ahmed ShaikhPublished in: Inf. (2023)
Keyphrases
- security analysis
- authentication protocol
- encryption algorithm
- security requirements
- public key
- smart card
- high security
- security properties
- defense mechanisms
- user authentication
- password guessing
- security model
- image encryption
- secret key
- authentication scheme
- key exchange
- tree structure
- encryption scheme
- mutual authentication
- power consumption
- peer to peer