Login / Signup

Security services for eSafety applications clusters.

Jinène MoslahLamia Ben Azzouz
Published in: IWCMC (2011)
Keyphrases
  • security services
  • security protocols
  • security mechanisms
  • key management
  • personal information
  • authentication mechanism
  • access control
  • government services