Login / Signup

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.

Jun ZhaoVirgil D. GligorAdrian PerrigJames Newsome
Published in: Security Protocols Workshop (2013)
Keyphrases
  • information retrieval
  • neural network
  • control system
  • sensitive information
  • database systems
  • augmented reality
  • trusted computing
  • portable devices