Login / Signup

Capabilities and Protection.

Roger M. Needham
Published in: GI Jahrestagung (1980)
Keyphrases
  • machine learning
  • data sets
  • database
  • real world
  • information systems
  • three dimensional
  • operating system
  • smart card
  • information security
  • individual privacy