Login / Signup
In the new converged world are we secure enough?
Paul King
Published in:
Inf. Secur. Tech. Rep. (2007)
Keyphrases
</>
databases
data sets
security issues
security analysis
distributed systems
security requirements
key management
security protocols
authentication protocol
user authentication
data encryption