An Intelligent Security Defensive Software Scheme and Realization.
Kun WangJin-dong WangLiu-qing ShenZhen-hua HanPublished in: IITSI (2010)
Keyphrases
- digital signature scheme
- authentication scheme
- security analysis
- identity based cryptography
- security vulnerabilities
- intrusion detection
- software systems
- software design
- security policies
- enterprise systems
- security model
- computer security
- security requirements
- access control
- software development
- blind signature scheme
- public key encryption
- protection schemes
- intellectual property protection
- functional requirements
- security issues
- software tools
- software architecture
- computer systems
- user authentication
- protection scheme
- public key cryptosystem
- software components
- user interface
- malware detection
- key distribution
- secure communication
- key exchange
- provably secure
- key management scheme