Login / Signup
Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication.
Nicola Laurenti
Anna Poltronieri
Published in:
ICL-GNSS (2020)
Keyphrases
</>
optimal design
security requirements
hidden markov models
identity authentication
user interface
design process
functional requirements
case study
software architecture
information security
network security
security analysis
factor authentication