Login / Signup
Secure e-learning using a holistic and immune security framework.
Jeffy Mwakalinga
Stewart Kowalski
Louise Yngström
Published in:
ICITST (2009)
Keyphrases
</>
e learning
security issues
security requirements
key management
security mechanisms
information security
network security
multi party
authentication protocol
user authentication
cryptographic protocols
security management
authentication mechanism