The paper highlights requirements for security elements and trusted environments, as well as ways to ensure their security and the possibility of analyzing the adequacy of the applied methods of protection.

sitemap

Разработка: студия Green Art