Login / Signup

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.

Vasily DesnitskyAndrey ChechulinIgor V. KotenkoDmitry LevshunMaxim Kolomeec
Published in: PDP (2016)
Keyphrases