Security Requirements and Protocols for a Broadcast Scenario.
Stephen T. KentPublished in: IEEE Trans. Commun. (1981)
Keyphrases
- security requirements
- security properties
- secure electronic
- security protocols
- concurrency control protocols
- smart card
- security analysis
- security mechanisms
- access control
- information security
- security model
- timing constraints
- security problems
- software architecture
- reference models
- security concerns
- mobile commerce
- security policies
- authentication protocol
- security patterns
- real world
- cryptographic protocols
- secret key
- covert channel