Login / Signup
How to Specify Security Services: A Practical Approach.
Javier López
Juan J. Ortega
José Luis Vivas
José M. Troya
Published in:
Communications and Multimedia Security (2003)
Keyphrases
</>
security services
security protocols
personal information
security mechanisms
key management
government services
authentication mechanism
information retrieval
mobile devices
response time
resource constrained
content providers