Towards an Architecture-Centric Approach to Security Analysis.
Qiong FengRick KazmanYuanfang CaiRan MoLu XiaoPublished in: WICSA (2016)
Keyphrases
- security analysis
- smart card
- public key
- high security
- security requirements
- image encryption
- security properties
- mutual authentication
- encryption algorithm
- authentication protocol
- security model
- authentication scheme
- proxy signature scheme
- private key
- encryption scheme
- user authentication
- information security
- image compression
- query processing
- high dimensional
- similarity measure
- database systems
- data mining