Login / Signup

Secure Certification for ePortfolios.

Lisha Chen-WilsonPatrick NewcombePiers RoyceSamuel OngTimothy WonnacottGary B. WillsDavid Argles
Published in: ICALT (2008)
Keyphrases
  • security requirements
  • third party
  • security mechanisms
  • cryptographic protocols
  • key management
  • covert channel
  • data sets
  • neural network
  • website
  • security issues
  • security level
  • stream cipher
  • key exchange protocol