Login / Signup
Towards NoC Protection of HT-Greyhole Attack.
Soultana Ellinidou
Gaurav Sharma
Olivier Markowitch
Jean-Michel Dricot
Guy Gogniat
Published in:
ICA3PP (3) (2020)
Keyphrases
</>
hough transform
countermeasures
routing algorithm
network on chip
information security
hypothesis testing
multi processor
secret key
data protection
malicious users
privacy protection
dos attacks