Hits:
Date of Publication:2022-10-04
Journal:Peer to Peer Networking and Applications
Affiliation of Author(s):电子信息与电气工程学部
Pre One:A Memory Integrity Protection Method based on Bloom Filter
Next One:A Method for Memory Integrity Authentication based on Bloom Filter