Login / Signup
Resistance and power in a security certification scheme: The case of c: cure.
Leiser Silva
Carol Hsu
James Backhouse
Aidan McDonnell
Published in:
Decis. Support Syst. (2016)
Keyphrases
</>
power consumption
information security
authentication protocol
security policies
authentication scheme
protection scheme
security analysis
secret sharing scheme
high security
key agreement
access control
electronic voting
key exchange
elliptic curve
key management
encryption scheme
third party