Authentication Control Point and Its Implications For Secure Processor Design
2014 ◽
Vol 13
(1)
◽
pp. 4127-4145
Keyword(s):
2016 ◽
Vol 72
(2)
◽
pp. II_31-II_39
Keyword(s):