Login / Signup
New Draft to Secure Cyberspace Leaked.
Scott L. Andresen
Published in:
IEEE Secur. Priv. (2003)
Keyphrases
</>
data sets
security issues
security requirements
security mechanisms
security analysis
key exchange
database
databases
neural network
genetic algorithm
web technologies
security level
cryptographic protocols
authentication scheme
digital world
covert channel