Inproceedings,

Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse.

, , , , and .
HOST, page 167. IEEE Computer Society, (2017)

Meta data

Tags

Users

  • @dblp

Comments and Reviews