Login / Signup
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.
YoungGyo Lee
Jeonghee Ahn
Seungjoo Kim
Dongho Won
Published in:
KES-AMSTA (2007)
Keyphrases
</>
hash functions
real time
real world
databases
machine learning
web services
case study
multi agent