Login / Signup
A Case for Practical Configuration Management Using Hardware-based Security Tokens.
Tim Lackorzynski
Max Ostermann
Stefan Köpsell
Hermann Härtig
Published in:
CoRR (2022)
Keyphrases
</>
configuration management
network management
security policies
low cost
real world
real time
information security
trusted computing
random number generator
computer systems
network security
reinforcement learning