Login / Signup
Code security analysis with assertions.
Jan Jürjens
Mark Yampolskiy
Published in:
ASE (2005)
Keyphrases
</>
security analysis
smart card
public key
security requirements
authentication protocol
high security
encryption scheme
source code
security properties
image encryption
security model
mutual authentication
computer systems
proxy signature scheme
multiresolution
private key
user authentication
query processing