Login / Signup

Fifty ways to secure dial-up connections.

Charles Cresson Wood
Published in: Comput. Secur. (1994)
Keyphrases
  • years ago
  • multi party
  • machine learning
  • e learning
  • case study
  • intrusion detection
  • secure communication