Login / Signup
Threat Model-based Security Analysis and Mitigation Strategies for a Trustworthy Metaverse.
Md. Ismail Hossain
Ragib Hasan
Published in:
MetaCom (2023)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security model
encryption scheme
image encryption
security properties
high security
proxy signature scheme
authentication protocol
encryption algorithm
image compression
user authentication