Using Secure Coprocessors to Protect Access to Enterprise Networks
2010 ◽
Vol 41
(3)
◽
pp. 307-338
◽
2011 ◽
Vol 7
(4)
◽
pp. 37-54
◽