Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)
Crossref DOI link: https://doi.org/10.1007/978-3-319-72359-4_47
Published Online: 2017-12-08
Published Print: 2017
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Ren, Lu
Chang, Rui
Yin, Qing
Wang, Wei
License valid from 2017-01-01