共 35 条
[1]
[Anonymous], 2017, W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbond TrustMETM Secure Element Security Target Lite
[2]
Bao Fenye., 2012, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, P1, DOI [10.1109/WoWMoM.2012.6263792, DOI 10.1145/2378023.2378025, DOI 10.1109/WOWMOM.2012.6263792]
[4]
Bedhief I, 2018, I C COMP SYST APPLIC
[5]
Corici AA, 2020, CONF INNOV CLOUD, P102, DOI 10.1109/ICIN48450.2020.9059457
[7]
Poonam Ninad Railkar DPNMS, 2021, Turkish Journal of Computer and Mathematics Education (TURCOMAT), V12, P2483, DOI [10.17762/turcomat.v12i6.5691, 10.17762/turcomat.v12i6.5691, DOI 10.17762/TURCOMAT.V12I6.5691]
[8]
El-Hajj M, 2017, 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET)