Login / Signup
IT Security Analysis Best Practices and Formal Approaches.
Daniel Le Métayer
Published in:
FOSAD (2007)
Keyphrases
</>
security analysis
security requirements
smart card
public key
security model
data mining
case study
high dimensional
motion estimation
high security