Login / Signup
Leakuidator: Leaky Resource Attacks and Countermeasures.
Mojtaba Zaheri
Reza Curtmola
Published in:
SecureComm (2) (2021)
Keyphrases
</>
countermeasures
information security
resource allocation
power analysis
java card
rural areas
security measures
semi supervised
smart card
resource constraints
databases
real world
security breaches
information warfare