Login / Signup

Using a secure permutational covert channel to detect local and wide area interposition attacks.

Jaroslaw PaduchJamie LevyBilal Khan
Published in: IWCMC (2009)
Keyphrases