📣 Help Shape the Future of UKRI's Gateway to Research (GtR)

We're improving UKRI's Gateway to Research and are seeking your input! If you would be interested in being interviewed about the improvements we're making and to have your say about how we can make GtR more user-friendly, impactful, and effective for the Research and Innovation community, please email gateway@ukri.org.

Can Code Polymorphism Limit Information Leakage?

First Author: Amarilli A
Attributed to:  Investigation of Power Analysis Attacks funded by EPSRC

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1007/978-3-642-21040-2_1

Publication URI: http://dx.doi.org/10.1007/978-3-642-21040-2_1

Type: Book Chapter

Book Title: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (2011)

Page Reference: 1-21

ISBN: 978-3-642-21039-6