Login / Signup
An experimental security analysis of two satphone standards.
Benedikt Driessen
Ralf Hund
Carsten Willems
Christof Paar
Thorsten Holz
Published in:
ACM Trans. Inf. Syst. Secur. (2013)
Keyphrases
</>
security analysis
security requirements
public key
smart card
high security
security properties
image encryption
metadata
security model
encryption scheme
authentication protocol
web services
mutual authentication
software architecture
software systems
intelligent agents
proxy signature scheme