Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications

PDF Slides Venue
Type
Publication
In IEEE Cybersecurity Development Conference (SecDev)