Login / Signup
A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol.
Ruxandra F. Olimid
Published in:
SOCO-CISIS-ICEUTE (2014)
Keyphrases
</>
countermeasures
information security
power analysis
databases
security measures
cyber attacks
decision making
lightweight
computer security
traffic accidents
cryptographic protocols
rural areas