No description
-
2020 (v1)PublicationUploaded on: April 14, 2023
-
2014 (v1)Publication
The successful operation of NATO missions requires the effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to unauthorized users. To resolve the conflict between confidentiality and availability in a dynamic coalition and network environment...
Uploaded on: March 27, 2023 -
2021 (v1)Publication
Several automated tools have been proposed to detect vulnerabilities. These tools are mainly evaluated in terms of their accuracy in detecting vulnerabilities, but the evaluation of their usability is a commonly neglected topic. Usability of automated security tools is particularly crucial when dealing with problems of cryptographic protocols...
Uploaded on: March 10, 2024 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023