Login / Signup
Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System.
Raj Kamal Kaur
Lalit Kumar Singh
Babita Pandey
Aditya Khamparia
Published in:
HIS (2019)
Keyphrases
</>
security analysis
security requirements
security model
public key
smart card
case study
security properties
encryption scheme
user authentication
high security
mutual authentication
image encryption
authentication protocol
data mining
encryption algorithm
countermeasures
authentication scheme
proxy signature scheme