Login / Signup
Making DTNs robust against spoofing attacks with localized countermeasures.
Md. Yusuf Sarwar Uddin
Ahmed Khurshid
Hee Dong Jung
Carl A. Gunter
Matthew Caesar
Tarek F. Abdelzaher
Published in:
SECON (2011)
Keyphrases
</>
countermeasures
information security
power analysis
java card
security measures
cyber attacks
databases