Login / Signup

Timing Attacks on PIN Input in VoIP Networks (Short Paper).

Ge ZhangSimone Fischer-Hübner
Published in: DIMVA (2011)
Keyphrases
  • input data
  • network design
  • data sets
  • countermeasures
  • cellular networks
  • network structure
  • network analysis
  • network architecture
  • watermarking technique
  • security protocols
  • network topologies