Can Code Polymorphism Limit Information Leakage?

First Author: Amarilli A
Attributed to:  Investigation of Power Analysis Attacks funded by EPSRC

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1007/978-3-642-21040-2_1

Publication URI: http://dx.doi.org/10.1007/978-3-642-21040-2_1

Type: Book Chapter

Book Title: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (2011)

Page Reference: 1-21

ISBN: 978-3-642-21039-6