Login / Signup
Secure Applications without Secure Infrastructures.
Dieter Gollmann
Published in:
MMM-ACNS (2010)
Keyphrases
</>
key management
security analysis
cryptographic protocols
artificial intelligence
information technology
standard model
key distribution
stream cipher
data mining
information retrieval
security requirements
security protocols
group communication
data encryption
covert channel