Login / Signup
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques.
Vincent Cheval
Véronique Cortier
Published in:
POST (2015)
Keyphrases
</>
security protocols
automated design
security properties
security services
data processing
data mining
intrusion detection
end to end
key management
cryptographic algorithms