Sign in

UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.

Geng LiJianwei LiuZongyang ZhangYanting Zhang
Published in: Inscrypt (2021)
Keyphrases
  • key management
  • expert systems
  • management system
  • security protocols
  • trusted computing
  • security patterns
  • high assurance