A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures.
Valentina CasolaAntonino MazzeoNicola MazzoccaValeria VittoriniPublished in: J. Comput. Secur. (2007)
Keyphrases
- public key
- security model
- security analysis
- public key cryptosystem
- public key encryption scheme
- private key
- elliptic curve cryptography
- public key cryptography
- encryption scheme
- session key
- public key infrastructure
- security issues
- security requirements
- access control
- information security
- authentication protocol
- diffie hellman
- blind signature scheme
- network security
- authentication scheme
- secure communication
- signcryption scheme
- provably secure
- public key encryption
- security properties
- elliptic curve
- standard model
- key management
- security mechanisms
- security policies
- rfid tags
- security level
- security protocols
- cca secure
- signature scheme
- real time