Login / Signup
Protection Against EEPROM Modification Attacks.
Wai W. Fung
James W. Gray III
Published in:
ACISP (1998)
Keyphrases
</>
countermeasures
traffic analysis
malicious attacks
watermarking scheme
security threats
computer security
java card
genetic algorithm
information systems
multistage
dos attacks
cyber attacks
watermarking method
security risks
terrorist attacks
malicious users