Login / Signup
How can secure software be trusted?
Lynn Futcher
Rossouw von Solms
Published in:
South Afr. Comput. J. (2011)
Keyphrases
</>
trusted computing
secure multi party
software development
software design
computer systems
software tools
software systems
data sets
neural network
source code
software architecture
open source
remote attestation