Login / Signup
CPU bugs, CPU backdoors and consequences on security.
Loïc Duflot
Published in:
J. Comput. Virol. (2009)
Keyphrases
</>
access control
data transfer
security requirements
information systems
security vulnerabilities
database
operating system
software systems
security mechanisms