Sign in

Implementing an untrusted operating system on trusted hardware.

David LieChandramohan A. ThekkathMark Horowitz
Published in: SOSP (2003)
Keyphrases