A comprehensive 3-dimensional security analysis of a controller in software-defined networking.
Yuchia TsengFarid Naït-AbdesselamAshfaq A. KhokharPublished in: Secur. Priv. (2018)
Keyphrases
- security analysis
- security requirements
- high security
- public key
- software development
- authentication protocol
- smart card
- image encryption
- real time
- wireless sensor networks
- computer systems
- software systems
- encryption scheme
- authentication scheme
- mutual authentication
- user authentication
- data access
- source code
- digital libraries