Secure System Design and Trustable Computing, p. 163-208
DOI: 10.1007/978-3-319-14971-4_5
Export citation
Search in Google Scholar
Full text: Unavailable