Etiquetas
brute-force attack
denial-of-service attack
dukpt
replay attack
confidentiality
zero-knowledge protocol
man-in-the-middle attack
authentication
cloud computing
secure communication channel
access control
e-health
Ver más
- Presentaciones
- Documentos
- Infografías