Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Figure 10

Component interaction.
820454.fig.0010