Login / Signup

Vulnerability Analysis of the Grid Data Security Authentication System.

Seung S. YangHongsik ChoiHankyu Joo
Published in: Inf. Secur. J. A Glob. Perspect. (2010)
Keyphrases
  • data security
  • encryption decryption
  • access control
  • data centric
  • data management
  • data integrity
  • data confidentiality
  • data privacy
  • information security
  • data protection
  • third party