Login / Signup

Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach.

Fangyong HouZhiying WangYuhua TangJifeng Liu
Published in: EUC (2004)
Keyphrases