Login / Signup

Model-Based Quantitative Security Analysis of Mobile Offloading Systems Under Timing Attacks.

Tianhui MengQiushi WangKatinka Wolter
Published in: ASMTA (2015)
Keyphrases
  • security analysis
  • computer systems
  • security requirements
  • public key
  • distributed systems
  • authentication scheme
  • high security
  • data mining
  • information sharing
  • security model
  • image encryption