Publication | Closed Access
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs
19
Citations
27
References
2018
Year
EngineeringData IntegrityInformation SecurityInformation Theoretic SecuritySoa SecurityComputer EngineeringSecurityData PrivacyInformation ForensicsSimulatable DemsComputer ScienceHardware Security SolutionSide-channel AttackFormal VerificationIntegrity VerificationData SecurityCryptographyReceiver Corruptions
| Year | Citations | |
|---|---|---|
Page 1
Page 1