Attacks vs. Countermeasures of SSL Protected Trust Model.
Fang QiZhe TangGuojun WangPublished in: ICYCS (2008)
Keyphrases
- countermeasures
- trust model
- information security
- trust management
- situation aware
- power analysis
- trust aware
- multiagent systems
- sensitive data
- cyber attacks
- java card
- security measures
- multi agent systems
- smart card
- trust and reputation models
- differential power analysis
- intrusion detection
- information systems
- security breaches