Login / Signup
Attacks on Cryptoprocessor Transaction Sets.
Mike Bond
Published in:
CHES (2001)
Keyphrases
</>
countermeasures
database
real time
data sets
concurrency control
computer security
data mining
digital images
distributed databases
transaction processing
transaction data
traffic analysis
commit protocols
malicious users