Login / Signup

Design and analysis of a secure two-phase locking protocol.

Sang H. SonRasikan David
Published in: COMPSAC (1994)
Keyphrases
  • user interface
  • design process
  • real world
  • learning algorithm
  • case study
  • data analysis
  • embedded systems
  • security issues
  • optimal design