Login / Signup
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
Alexandre Duc
Sebastian Faust
François-Xavier Standaert
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
information security
intrusion detection
security policies
security requirements
security threats
network security
security issues
key management
security systems
information assurance
lightweight
high security
security measures
security management
security analysis
sensitive data
rfid tags
network management