Mots-clés
brute-force attack
denial-of-service attack
dukpt
replay attack
confidentiality
zero-knowledge protocol
man-in-the-middle attack
authentication
cloud computing
secure communication channel
access control
e-health
Tout plus
- Présentations
- Documents
- Infographies