Login / Signup
Software security analysis and assessment model for the web-based applications.
Yong Wang
William M. Lively
Dick B. Simmons
Published in:
J. Comput. Methods Sci. Eng. (2009)
Keyphrases
</>
security analysis
high security
security requirements
software systems
smart card
public key
security properties
image encryption
authentication protocol
security model
encryption scheme
encryption algorithm
source code
software architecture
object oriented
user authentication
low cost
software engineering