Login / Signup
Guest Editors' Introduction: Secure or Usable?
Lorrie Faith Cranor
Simson L. Garfinkel
Published in:
IEEE Secur. Priv. (2004)
Keyphrases
</>
virtual machine
stream cipher
security analysis
databases
highly efficient
security requirements
data encryption
database
identity management
cryptographic protocols
key management
sensitive data
security issues
special issue
cost effective
information systems
genetic algorithm