Security Design with Endogenous Implementation Choice

2019 ◽  
Author(s):  
Spyros Terovitis
Keyword(s):  
Sign in / Sign up

Export Citation Format

Share Document