Linked e-resources
Details
Table of Contents
Security for ubiquitous computing
Modelling and anaylsis of attacks
Smartphone security
Cryptography and theory
Enterprise and cloud security
Machine learning and security
Privacy
Client security and authentication.
Modelling and anaylsis of attacks
Smartphone security
Cryptography and theory
Enterprise and cloud security
Machine learning and security
Privacy
Client security and authentication.