Login / Signup

A secure channel establishment method on a hardware security module.

Daewon KimYongSung JeonJeongnyeo Kim
Published in: ICTC (2014)
Keyphrases
  • significant improvement
  • similarity measure
  • objective function
  • low cost
  • detection method
  • security issues
  • support vector machine
  • access control
  • security requirements
  • data security
  • trusted computing