Login / Signup
Products Used to Secure Networked Macintosh Computers.
Michael I. Sobol
Published in:
Inf. Secur. J. A Glob. Perspect. (1995)
Keyphrases
</>
turing test
search engine
information systems
lightweight
security requirements
product recommendation
authentication scheme
key exchange
supply chain
computer systems
security issues
security protocols
long tail
cryptographic protocols
market share
filemaker pro