Login / Signup
Comparison of Safety and Security Analysis Techniques.
Emilia Cioroaica
Smruti Ranjan Kar
Ioannis Sorokos
Published in:
CISIS-ICEUTE (2021)
Keyphrases
</>
security analysis
smart card
security requirements
public key
encryption scheme
high security
security properties
security model
user authentication
image encryption
proxy signature scheme
databases
database systems
query processing
mutual authentication