Integrating a Usable Security Protocol into User Authentication Services Design Process More Books Like This

Adaptive Mobile Computing Adaptive Mobile Computing
2017
Trust, Security and Privacy for Big Data Trust, Security and Privacy for Big Data
2022
Cyber Security and Digital Forensics Cyber Security and Digital Forensics
2022
Cyber Security and Network Security Cyber Security and Network Security
2022
Cyber-Assurance for the Internet of Things Cyber-Assurance for the Internet of Things
2016
Cloud Security Cloud Security
2021