Login / Signup
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Xinwen Fu
Bryan Graham
Dong Xuan
Riccardo Bettati
Wei Zhao
Published in:
Information Hiding (2004)
Keyphrases
</>
countermeasures
information security
theoretical analysis
java card
security measures
power analysis
cyber attacks
rural areas
data mining
information technology
differential power analysis