Analysis of a hardware security module's high-availability setting | IEEE Journals & Magazine | IEEE Xplore