Login / Signup
Vulnerability Coverage for Secure Configuration.
Shuvalaxmi Dass
Akbar Siami Namin
Published in:
CoRR (2020)
Keyphrases
</>
optimal configuration
data sets
security issues
identity management
security analysis
standard model
stream cipher
key management
security requirements
lightweight
real time
user authentication
cryptographic protocols
security properties
authentication scheme
multi party
security management
test suite
data encryption