Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication.
Surabhi AnandPriya Jain NitinRavi RastogiPublished in: UKSim (2012)
Keyphrases
- security analysis
- security requirements
- high security
- symmetric key
- authentication protocol
- user authentication
- public key
- security properties
- security model
- internet banking
- smart card
- encryption scheme
- mutual authentication
- key exchange
- elliptic curve cryptography
- private key
- image encryption
- encryption algorithm
- authentication scheme
- security mechanisms
- access control
- security policies
- information security
- key distribution
- public key cryptography
- cryptographic protocols
- access control policies
- intrusion detection
- anomaly detection