Integrating a Usable Security Protocol into User Authentication Services Design Process こちらもおすすめ

Trust, Security and Privacy for Big Data Trust, Security and Privacy for Big Data
2022年
Cyber Security and Digital Forensics Cyber Security and Digital Forensics
2022年
Cyber Security and Network Security Cyber Security and Network Security
2022年
Cyber-Assurance for the Internet of Things Cyber-Assurance for the Internet of Things
2016年
Cloud Security Cloud Security
2021年