Login / Signup
Secure the Clones
Thomas P. Jensen
Florent Kirchner
David Pichardie
Published in:
Log. Methods Comput. Sci. (2012)
Keyphrases
</>
source code
security level
security issues
key management
databases
cryptographic protocols
software systems
standard model
covert channel
real time
data encryption
identity management
highly efficient
lightweight
high level
website
information systems