"Overcoming an Untrusted Computing Base: Detecting and Removing Malicious ..."

Matthew Hicks et al. (2010)

Details and statistics

DOI:

access: closed

type: Journal Article

metadata version: 2020-04-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics