"Keeping data secret under full compromise using porter devices."

Christina Pöpper et al. (2010)

Details and statistics

DOI: 10.1145/1920261.1920297

access: closed

type: Conference or Workshop Paper

metadata version: 2021-08-23

a service of  Schloss Dagstuhl - Leibniz Center for Informatics