Login / Signup

Transferring trusted logs across vulnerable paths for digital forensics.

Akihiro TomonoMinoru UeharaYuji Shimada
Published in: MoMM (2009)
Keyphrases