Login / Signup
Active hardware attacks and proactive countermeasures.
Artemios G. Voyiatzis
Dimitrios N. Serpanos
Published in:
ISCC (2002)
Keyphrases
</>
countermeasures
information security
low cost
java card
security measures
power analysis
security breaches
computer systems
embedded systems
cyber attacks
rural areas
data sources
reactive behavior