Login / Signup
Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
Daniele Perito
Gene Tsudik
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
embedded devices
databases
security protocols
database
security issues
security mechanisms
real time
mobile devices
source code
embedded systems
home automation