First Page | Document Content | |
---|---|---|
Date: 2016-05-17 22:04:37Cryptography Computer access control Secret sharing Pico Authentication Secure cryptoprocessor Encryption Security token Polynomial Public-key cryptography | Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2Add to Reading ListSource URL: www.cl.cam.ac.ukDownload Document from Source WebsiteFile Size: 2,07 MBShare Document on Facebook |