Login / Signup
Protection.
Roger M. Needham
Published in:
Advanced Course: Local Area Networks (1983)
Keyphrases
</>
information security
privacy protection
data protection
security architecture
protection scheme
data sets
real world
knowledge base
image processing
relational databases
special case
e government
reed solomon codes