Login / Signup
How to secure ITS applications?
Rim Moalla
Brigitte Lonc
Houda Labiod
Noemie Simoni
Published in:
Med-Hoc-Net (2012)
Keyphrases
</>
security requirements
sensitive data
security issues
databases
low cost
lightweight
smart card
case study
learning algorithm
database
key management
security analysis
authentication protocol
key distribution
cryptographic protocols
identity management
secure communication
stream cipher