Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-01004-0_14

Related search