Login / Signup

Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques.

Vincent ChevalVéronique Cortier
Published in: POST (2015)
Keyphrases
  • security protocols
  • automated design
  • security properties
  • security services
  • data processing
  • data mining
  • intrusion detection
  • end to end
  • key management
  • cryptographic algorithms