Abstract
Retrieving assets inside a secure element is a challenging task. The most attractive assets are the cryptographic keys stored into the non-volatile me......
小提示:本篇文献需要登录阅读全文,点击跳转登录