Login / Signup
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques.
Mounika Deverashetti
Ranjitha K.
K. V. Pradeepthi
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
security analysis
security requirements
high security
public key
smart card
security model
security properties
real time
encryption scheme
authentication protocol
image encryption
dynamic environments
user authentication
information security
low cost
query processing
private key
authentication scheme