Login / Signup
Methodology for security analysis of data-processing systems.
John M. Carroll
Oi-Lun Wu
Published in:
Comput. Secur. (1983)
Keyphrases
</>
security analysis
data processing
smart card
security requirements
computer systems
database
multi agent systems
network traffic
public key
encryption scheme
image encryption