Scheduling the execution of credentials in constrained secure environments

  • Jan-Erik Ekberg
  • , N. Asokan
  • , Kari Kostiainen
  • , Aarne Rantala

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

17 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Scheduling the execution of credentials in constrained secure environments'. Together they form a unique fingerprint.

Keyphrases

INIS

Computer Science