Login / Signup

Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy.

Gwenaël J. DoërrJean-Luc Dugelay
Published in: IWDW (2005)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • cyber attacks
  • java card
  • security measures
  • digital images
  • similarity search