Login / Signup
Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
Bagus Santoso
Yasutada Oohama
Published in:
ISIT (2019)
Keyphrases
</>
encryption key
block cipher
smart card
information sources
encryption scheme
data sources
encryption decryption
security requirements
databases
sensitive data
authentication protocol
lightweight
blind source separation
knowledge sources
standard model
authentication scheme
third party
neural network