Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-01004-0_14
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2009
Authors
Publisher
Springer Berlin Heidelberg