@dblp

Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse.

, , , , and . HOST, page 167. IEEE Computer Society, (2017)

Links and resources

Tags