Login / Signup
Quantitative Security Analysis for Programs with Low Input and Noisy Output.
Tri Minh Ngo
Marieke Huisman
Published in:
ESSoS (2014)
Keyphrases
</>
security analysis
smart card
security requirements
input data
public key
high security
security model
security properties
encryption scheme
encryption algorithm
user authentication
image encryption
authentication protocol
authentication scheme
information security
mutual authentication