Jaiswal, Shruti; Gupta, Daya - In: International Journal of Information Systems in the … 10 (2018) 1, pp. 28-53
. A security index is generated which shows the effectiveness of deployed/ chosen security algorithm. The process ends … requirements. During the design phase based on prioritized requirements, environment parameters and attribute a suitable security … algorithm mainly cryptography algorithms are identified. Then a question arises how to test the effectiveness of chosen …