Protecting cryptographic keys: the trace-and-revoke approach | IEEE Journals & Magazine | IEEE Xplore