Login / Signup
Using Strategy Objectives for Network Security Analysis.
Elie Bursztein
John C. Mitchell
Published in:
Inscrypt (2009)
Keyphrases
</>
security analysis
public key
smart card
high security
mutual authentication
security requirements
wireless sensor networks
peer to peer
computer networks
database systems
computer systems
network traffic
authentication protocol
security properties
authentication scheme
image encryption