Login / Signup
PKIX over Secure HTTP (POSH).
Matthew Miller
Peter Saint-Andre
Published in:
RFC (2015)
Keyphrases
</>
website
open source
security issues
security requirements
security analysis
covert channel
real time
databases
data mining
cloud computing
third party
security mechanisms
standard model
user authentication
key exchange
data encryption