Login / Signup
A Security Analysis on Apple Pay.
Ashay S. Jawale
Joon S. Park
Published in:
EISIC (2016)
Keyphrases
</>
security analysis
public key
smart card
security requirements
high security
security properties
image encryption
user authentication
security model
encryption scheme
authentication protocol
encryption algorithm
authentication scheme
mutual authentication
wireless sensor networks
image compression