Login / Signup

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.

Xinwen FuBryan GrahamDong XuanRiccardo BettatiWei Zhao
Published in: Information Hiding (2004)
Keyphrases
  • countermeasures
  • information security
  • theoretical analysis
  • java card
  • security measures
  • power analysis
  • cyber attacks
  • rural areas
  • data mining
  • information technology
  • differential power analysis