Cryptographic security measures for encryption, authentication, non repudiation are important … but not sufficient. My intention is to make the reader aware of non-technical security issues.
CITATION STYLE
Van Auseloos, J. (1990). Technical security: The starting point. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 434 LNCS, pp. 243–248). Springer Verlag. https://doi.org/10.1007/3-540-46885-4_26
Mendeley helps you to discover research relevant for your work.