Login / Signup
A secure channel establishment method on a hardware security module.
Daewon Kim
YongSung Jeon
Jeongnyeo Kim
Published in:
ICTC (2014)
Keyphrases
</>
significant improvement
similarity measure
objective function
low cost
detection method
security issues
support vector machine
access control
security requirements
data security
trusted computing