Login / Signup
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation.
Regine Endsuleit
Arno Wagner
Published in:
Security and Management (2004)
Keyphrases
</>
countermeasures
security measures
multi agent
information security
security issues
java card
rural areas
security requirements
sensitive data
cyber attacks
power analysis
efficient computation
e government
sql injection
databases
security mechanisms
user authentication
intrusion detection
differential power analysis