Cited By
View all- Li Li Dijiang Huang Zhidong Shen Bouzefrane S(2013)A cloud based dual-root trust model for secure mobile online transactions2013 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2013.6555287(4404-4409)Online publication date: Apr-2013
- Brasser FBugiel SFilyanov ASadeghi ASchulz S(2012)Softer SmartcardsFinancial Cryptography and Data Security10.1007/978-3-642-32946-3_24(329-343)Online publication date: 2012
- Fournet CPlanul J(2011)Compiling information-flow security to minimal trusted computing basesProceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software10.5555/1987211.1987223(216-235)Online publication date: 26-Mar-2011
- Show More Cited By