Login / Signup

Towards NoC Protection of HT-Greyhole Attack.

Soultana EllinidouGaurav SharmaOlivier MarkowitchJean-Michel DricotGuy Gogniat
Published in: ICA3PP (3) (2020)
Keyphrases
  • hough transform
  • countermeasures
  • routing algorithm
  • network on chip
  • information security
  • hypothesis testing
  • multi processor
  • secret key
  • data protection
  • malicious users
  • privacy protection
  • dos attacks