Login / Signup

Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems.

Paolo GuardaSilvio RaniseHari Siswantoro
Published in: SACMAT (2017)
Keyphrases
  • security analysis
  • information systems
  • security properties
  • smart card
  • data mining
  • databases
  • data mining techniques
  • security requirements
  • public key
  • authentication protocol
  • mutual authentication