Login / Signup
Network Security Analysis Based on Consolidated Threat Resources.
Oleg Garasym
Liliya Chyrun
Nadija Chernovol
Aleksandr Gozhyj
Victor Gozhyj
Irina Kalinina
Bohdan Rusyn
Liubomyr Pohreliuk
Maksym Korobchynskyi
Published in:
COLINS (2020)
Keyphrases
</>
security analysis
smart card
security requirements
public key
security properties
security model
image encryption
peer to peer
high security
communication networks
authentication scheme
mutual authentication