Enclaves in the clouds
暂无分享,去创建一个
Legal considerations and broader implications
[1] Christopher Kruegel,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2019, Lecture Notes in Computer Science.
[2] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.