Loading…

User-controlled cyber-security using automated key generation

Traditionally, several different methods are fully capable of providing an adequate degree of security to the threats and attacks that exists for revealing different keys. Though almost all the traditional methods give a good level of immunity to any possible breach in security keys, the biggest iss...

Full description

Saved in:
Bibliographic Details
Main Author: Halima Shnishah
Format: Default Thesis
Published: 2020
Subjects:
Online Access:https://dx.doi.org/10.26174/thesis.lboro.12619433.v1
Tags: Add Tag
No Tags, Be the first to tag this record!