Login / Signup

A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol.

Ruxandra F. Olimid
Published in: SOCO-CISIS-ICEUTE (2014)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • databases
  • security measures
  • cyber attacks
  • decision making
  • lightweight
  • computer security
  • traffic accidents
  • cryptographic protocols
  • rural areas