Безопасность информационных технологий (Feb 2014)
Applicable to Key Carrier Attacks
Abstract
At this paper the author describes attacks for removable key devices platforms.
Безопасность информационных технологий (Feb 2014)
At this paper the author describes attacks for removable key devices platforms.