Login / Signup
Actively revealing card attack on card-based protocols.
Ken Takashima
Daiki Miyahara
Takaaki Mizuki
Hideaki Sone
Published in:
Nat. Comput. (2022)
Keyphrases
</>
smart card
authentication protocol
low cost
social networks
power analysis
database
neural network
search engine
knowledge base
decision trees
intrusion detection
network traffic
secret key
security analysis
communication protocols