Computer Security Analysis through Decompilation and High-Level Debugging.
Cristina CifuentesTrent WaddingtonMike Van EmmerikPublished in: WCRE (2001)
Keyphrases
- security analysis
- high level
- public key
- security requirements
- smart card
- security model
- computer systems
- high security
- image encryption
- security properties
- mutual authentication
- proxy signature scheme
- user authentication
- authentication protocol
- encryption scheme
- authentication scheme
- data management
- data mining
- private key
- multiresolution