Validating the Security of Medusa: A survivability Protocol for Security Systems.
Wiebe K. WiechersSemir DaskapanPublished in: WOSIS (2005)
Keyphrases
- security systems
- security mechanisms
- rule based systems
- cryptographic algorithms
- biometric data
- security protocols
- security breaches
- intrusion tolerant
- security issues
- cryptographic protocols
- lightweight
- security requirements
- information security
- operating system
- security level
- key agreement protocol
- access control
- low cost
- database systems