Yasin Ararse, Abdi-Hakim (2013)
Diplomityö
Cryptographic functionality implementation approaches have evolved over time, first, for running security software on a general-purpose processor, second, employing a separate security co-processor ,and third, using built-in ...