Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Yangyi ChenTongxin LiXiaoFeng WangKai ChenXinhui HanPublished in: CCS (2015)
Keyphrases
- security analysis
- smart card
- public key
- cloud computing
- high security
- security model
- security requirements
- security properties
- image encryption
- authentication protocol
- fault tolerant
- encryption scheme
- databases
- distributed systems
- encryption algorithm
- mutual authentication
- user authentication
- knn
- query processing
- data mining