Login / Signup

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion).

Virgil D. Gligor
Published in: Security Protocols Workshop (2013)
Keyphrases
  • trusted third party
  • data acquisition
  • subject matter