Sicherheitsbedrohungen mit Root-of-Trust-Methoden kontern
Crossref DOI link: https://doi.org/10.1007/s35658-024-1894-9
Published Online: 2024-07-19
Published Print: 2024-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Moriyama, Daisuke
Text and Data Mining valid from 2024-07-01
Version of Record valid from 2024-07-01
Article History
First Online: 19 July 2024