Login / Signup
Side-Channel Attack Using Meet-in-the-Middle Technique.
Jongsung Kim
Seokhie Hong
Published in:
Comput. J. (2010)
Keyphrases
</>
countermeasures
power analysis
secret key
smart card
security measures
database
real world
database systems
genetic algorithm
multi agent
information security
denial of service attacks
malicious users
attack scenarios