Login / Signup
An Intelligent Security Defensive Software Scheme and Realization.
Kun Wang
Jin-dong Wang
Liu-qing Shen
Zhen-hua Han
Published in:
IITSI (2010)
Keyphrases
</>
digital signature scheme
authentication scheme
security analysis
identity based cryptography
security vulnerabilities
intrusion detection
software systems
software design
security policies
enterprise systems
security model
computer security
security requirements
access control
software development
blind signature scheme
public key encryption
protection schemes
intellectual property protection
functional requirements
security issues
software tools
software architecture
computer systems
user authentication
protection scheme
public key cryptosystem
software components
user interface
malware detection
key distribution
secure communication
key exchange
provably secure
key management scheme