Login / Signup
Using model-based security analysis in component-oriented system development.
Gyrd Brændeland
Ketil Stølen
Published in:
QoP (2006)
Keyphrases
</>
security analysis
public key
smart card
security requirements
high security
case study
information systems
multiresolution
database applications
encryption scheme
digital libraries
wireless sensor networks
authentication protocol
encryption algorithm