Login / Signup
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software.
Giovanni Agosta
Alessandro Barenghi
Gerardo Pelosi
Michele Scandale
Published in:
DAC (2014)
Keyphrases
</>
embedded software
security protocols
artificial intelligence
embedded systems
key management
database
real time
sequence diagrams