Login / Signup
Security Analysis of a Full-Body Scanner.
Keaton Mowery
Eric Wustrow
Tom Wypych
Corey Singleton
Chris Comfort
Eric Rescorla
J. Alex Halderman
Hovav Shacham
Stephen Checkoway
Published in:
USENIX Security Symposium (2014)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
encryption scheme
image encryption
security properties
authentication protocol
security model
mutual authentication
authentication scheme
information systems
high dimensional
database systems
user authentication