Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications

Publication
In IEEE Cybersecurity Development Conference (SecDev)

Related