"Protection Tiers and Their Applications for Evaluating Untrusted Code on A ..."

Zhuhan Jiang, Jiansheng Huang, Rezina Akhter (2015)

Details and statistics

DOI: 10.12720/JCM.10.11.918-925

access: closed

type: Journal Article

metadata version: 2020-07-14

a service of  Schloss Dagstuhl - Leibniz Center for Informatics