Login / Signup
Electronic messaging security: a comparison of three approaches.
Russell Housley
Published in:
ACSAC (1989)
Keyphrases
</>
strengths and weaknesses
intrusion detection
machine learning
key management
web services
access control
statistical databases
bulletin board