Piece about our paper in the International Journal of Information and Computer Security which surveyed security mechanisms and their shortcomings
You must be logged in to post a comment.