↓ Skip to main content

Information Security Theory and Practice

Overview of attention for book
Attention for Chapter 5: EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
15 Mendeley