@dblp

Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens.

, , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 197-213. Springer, (2015)

Links and resources

Tags