Login / Signup
Moat: Verifying Confidentiality of Enclave Programs.
Rohit Sinha
Sriram K. Rajamani
Sanjit A. Seshia
Kapil Vaswani
Published in:
CCS (2015)
Keyphrases
</>
access control
model checking
neural network
data sets
computer vision
information systems
hidden markov models
information security