Vulnerability Coverage for Secure Configuration.
Shuvalaxmi DassAkbar Siami NaminPublished in: CoRR (2020)
Keyphrases
- optimal configuration
- data sets
- security issues
- identity management
- security analysis
- standard model
- stream cipher
- key management
- security requirements
- lightweight
- real time
- user authentication
- cryptographic protocols
- security properties
- authentication scheme
- multi party
- security management
- test suite
- data encryption