Login / Signup

An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.

Nitin NaikPaul GracePaul JenkinsKshirasagar NaikJingping Song
Published in: Comput. Secur. (2022)
Keyphrases