Login / Signup

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.

Anna MpantiStavros D. NikolopoulosIosif Polenakis
Published in: CompSysTech (2017)
Keyphrases