Low Cost Attacks on Tamper Resistant Devices.
Ross J. AndersonMarkus G. KuhnPublished in: Security Protocols Workshop (1997)
Keyphrases
- low cost
- embedded systems
- low power consumption
- scanning devices
- countermeasures
- mobile devices
- low power
- embedded devices
- camera phones
- digital camera
- highly efficient
- rfid tags
- reconfigurable hardware
- malicious attacks
- real time
- data acquisition
- handheld devices
- image watermarking
- traffic analysis
- mobile applications
- information systems
- computer security
- watermarking algorithm
- denial of service attacks
- watermarking scheme
- terrorist attacks
- malicious users
- mobile phone