Login / Signup
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems.
Pavel Moravec
Michal Krumnikl
Published in:
CISIM (2017)
Keyphrases
</>
countermeasures
legacy systems
information security
reverse engineering
business rules
source code
information systems
security measures
cyber attacks
power analysis
business processes
requirements engineering
software engineering
business process
data storage