[1]
“Trusted Computing”, JARCSE, vol. 1, no. 4, pp. 08–11, Apr. 2014, doi: 10.53555/nncse.v1i4.518.