Login / Signup

IT Security Analysis Best Practices and Formal Approaches.

Daniel Le Métayer
Published in: FOSAD (2007)
Keyphrases
  • security analysis
  • security requirements
  • smart card
  • public key
  • security model
  • data mining
  • case study
  • high dimensional
  • motion estimation
  • high security