Security Analysis Using Subjective Attack Trees.
Nasser Al-HadhramiMatthew CollinsonNir OrenPublished in: SECITC (2020)
Keyphrases
- security analysis
- authentication protocol
- encryption algorithm
- smart card
- password guessing
- public key
- secret key
- security requirements
- high security
- security model
- user authentication
- security properties
- defense mechanisms
- countermeasures
- encryption scheme
- image encryption
- key exchange
- mutual authentication
- query processing
- private key
- low cost