Login / Signup

Active hardware attacks and proactive countermeasures.

Artemios G. VoyiatzisDimitrios N. Serpanos
Published in: ISCC (2002)
Keyphrases
  • countermeasures
  • information security
  • low cost
  • java card
  • security measures
  • power analysis
  • security breaches
  • computer systems
  • embedded systems
  • cyber attacks
  • rural areas
  • data sources
  • reactive behavior