Security Analysis of Information Systems Based on Attack Sequences Generation and Testing.
Roman KryukovElena DoynikovaIgor V. KotenkoPublished in: IDC (2021)
Keyphrases
- security analysis
- information systems
- authentication protocol
- encryption algorithm
- security requirements
- security model
- public key
- smart card
- password guessing
- defense mechanisms
- high security
- user authentication
- information security
- security properties
- mutual authentication
- encryption scheme
- secret key
- image encryption
- pseudorandom
- authentication scheme
- private key
- data mining
- high dimensional
- access control policies