Login / Signup

In the new converged world are we secure enough?

Paul King
Published in: Inf. Secur. Tech. Rep. (2007)
Keyphrases
  • databases
  • data sets
  • security issues
  • security analysis
  • distributed systems
  • security requirements
  • key management
  • security protocols
  • authentication protocol
  • user authentication
  • data encryption