Login / Signup
Softwire Security Analysis and Requirements.
Shu Yamamoto
Carl Williams
Hidetoshi Yokota
Florent Parent
Published in:
RFC (2009)
Keyphrases
</>
security analysis
security requirements
public key
high security
smart card
security model
image encryption
security properties
encryption scheme
authentication protocol
user authentication
mutual authentication
information security
encryption algorithm
proxy signature scheme