Login / Signup
Paradox Stems from the Security Model or the Security Proof?.
Qiong Pu
Jianmin Ding
Published in:
ISCSCT (1) (2008)
Keyphrases
</>
security model
security requirements
access control
security architecture
public key
security analysis
provably secure
smart card
security policies
security properties
real time
information security
encryption scheme
security mechanisms
designated verifier
wireless sensor networks
databases