As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
It is argued, that to assure security, we need to make use of all three vehicles mentioned in the title, provided we select carefully which type to use in what circumstances. Many useful activities in these areas are under way. There is an important danger, however: if we do not take into account the needs of practical applicability, the net result of all efforts might be an increase of the gap between theory and practice, and thus a contrary effect of the intended one.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.