Information Security Theory and Practice
Springer International Publishing
Chapter title |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
|
---|---|
Chapter number | 5 |
Book title |
Information Security Theory and Practice
|
Published by |
Springer, Cham, September 2017
|
DOI | 10.1007/978-3-319-93524-9_5 |
Book ISBNs |
978-3-31-993523-2, 978-3-31-993524-9
|
Authors |
Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
Country | Count | As % |
---|---|---|
Unknown | 15 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Master | 4 | 27% |
Unspecified | 1 | 7% |
Lecturer | 1 | 7% |
Student > Ph. D. Student | 1 | 7% |
Professor | 1 | 7% |
Other | 2 | 13% |
Unknown | 5 | 33% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 8 | 53% |
Business, Management and Accounting | 1 | 7% |
Unspecified | 1 | 7% |
Unknown | 5 | 33% |