↓ Skip to main content

Trusted Computing - Challenges and Applications

Overview of attention for book
Attention for Chapter 5: Embedded Trusted Computing with Authenticated Non-volatile Memory
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
30 Mendeley
citeulike
1 CiteULike