Login / Signup

Keeping data secret under full compromise using porter devices.

Christina PöpperDavid A. BasinSrdjan CapkunCas Cremers
Published in: ACSAC (2010)
Keyphrases