Loading…
User-controlled cyber-security using automated key generation
Traditionally, several different methods are fully capable of providing an adequate degree of security to the threats and attacks that exists for revealing different keys. Though almost all the traditional methods give a good level of immunity to any possible breach in security keys, the biggest iss...
Saved in:
Main Author: | |
---|---|
Format: | Default Thesis |
Published: |
2020
|
Subjects: | |
Online Access: | https://dx.doi.org/10.26174/thesis.lboro.12619433.v1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|