Login / Signup
Secure Boot Revisited.
Kurt Dietrich
Johannes Winter
Published in:
ICYCS (2008)
Keyphrases
</>
artificial intelligence
databases
covert channel
security properties
security model
neural network
information systems
distributed systems
access control
multi party
security requirements
key management
authentication protocol
data mining
user authentication
authentication scheme
real time