Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Figure 2

Entities and application scenario.
820454.fig.002