Login / Signup
Design and analysis of a secure two-phase locking protocol.
Sang H. Son
Rasikan David
Published in:
COMPSAC (1994)
Keyphrases
</>
user interface
design process
real world
learning algorithm
case study
data analysis
embedded systems
security issues
optimal design