Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
Alexandre DucSebastian FaustFrançois-Xavier StandaertPublished in: J. Cryptol. (2019)
Keyphrases
- intrusion detection
- security policies
- information security
- network security
- security issues
- security problems
- information assurance
- security systems
- computer security
- access control
- functional requirements
- security threats
- key management
- statistical databases
- security analysis
- neural network
- security vulnerabilities
- mobile devices