Fig. 1From: Side-channel attacks against the human brain: the PIN code case study (extended version)Evaluation methodologyBack to article page