@dblp

Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.

, , and . SecDev, page 88-93. IEEE Computer Society, (2016)

Links and resources

Tags