Sign in

Analysis of existing remote attestation techniques.

Masoom AlamTamleek AliSanaullah KhanShahbaz KhanMuhammad AliMohammad NaumanAmir HayatMuhammad Khurram KhanKhaled Alghathbar
Published in: Secur. Commun. Networks (2012)
Keyphrases
  • data analysis
  • databases
  • lightweight
  • trusted computing