Login / Signup
Post-deployment trust evaluation in wireless cryptographic ICs.
Yier Jin
Dzmitry Maliuk
Yiorgos Makris
Published in:
DATE (2012)
Keyphrases
</>
trust evaluation
ambient intelligent
trust management
wireless networks
smart card
wireless communication
mobile devices
management system
database
user interface
distributed systems
hash functions
virtual communities
security protocols