Login / Signup

Secure memory erasure in the presence of man-in-the-middle attackers.

Rolando Trujillo-Rasua
Published in: J. Inf. Secur. Appl. (2021)
Keyphrases
  • memory usage
  • memory space
  • security issues
  • lightweight
  • memory requirements
  • computational power
  • computing power
  • information systems
  • main memory
  • limited memory
  • authentication protocol
  • memory size