Sign in

Providing security on demand using invasive computing.

Gabor DrescherChristoph ErhardtFelix C. FreilingJohannes GötzfriedDaniel LohmannPieter MaeneTilo MüllerIngrid VerbauwhedeAndreas WeichslgartnerStefan Wildermann
Published in: it Inf. Technol. (2016)
Keyphrases