Login / Signup
Frameworks for secure, forensically safe and auditable applications.
Ahmed Patel
Published in:
Comput. Stand. Interfaces (2008)
Keyphrases
</>
lightweight
evaluation methods
security mechanisms
security requirements
security protocols
covert channel
neural network
machine learning
artificial intelligence
security issues
multi party
key management
security services