Agent Protection Based on the Use of Cryptographic Hardware | Publicación