Weaknesses. no implemented authentication capabilities, • no implemented encryption capabilities.
Appears in 2 contracts
Sources: Grant Agreement, Grant Agreement
Weaknesses. no implemented authentication capabilities, • no implemented encryption capabilities.
Appears in 2 contracts
Sources: Grant Agreement, Grant Agreement