Login / Signup
Understanding the security of app-in-the-middle IoT.
Hui Liu
Juanru Li
Dawu Gu
Published in:
Comput. Secur. (2020)
Keyphrases
</>
security problems
information security
key management
access control
security requirements
management system
intrusion detection
statistical databases
security policies
security threats
security issues
network security
database
computer security
elliptic curve
mobile phone
social media