Login / Signup
Timing Attacks Against Trusted Path.
Jonathan T. Trostle
Published in:
IEEE Symposium on Security and Privacy (1998)
Keyphrases
</>
countermeasures
shortest path
attack detection
watermarking scheme
genetic algorithm
watermarking algorithm
optimal path
security mechanisms
computer security
security protocols
security threats
security vulnerabilities
malicious users