"Protection of software algorithms executed on secure modules."

Henk D. L. Hollmann et al. (1997)

Details and statistics

DOI: 10.1016/S0167-739X(97)89111-X

access: closed

type: Journal Article

metadata version: 2023-10-22

a service of  Schloss Dagstuhl - Leibniz Center for Informatics