Login / Signup
Secure Certification for ePortfolios.
Lisha Chen-Wilson
Patrick Newcombe
Piers Royce
Samuel Ong
Timothy Wonnacott
Gary B. Wills
David Argles
Published in:
ICALT (2008)
Keyphrases
</>
security requirements
third party
security mechanisms
cryptographic protocols
key management
covert channel
data sets
neural network
website
security issues
security level
stream cipher
key exchange protocol