Login / Signup
Vectorial Approach to Fast Correlation Attacks.
Jovan Dj. Golic
Philip Hawkes
Published in:
Des. Codes Cryptogr. (2005)
Keyphrases
</>
countermeasures
correlation coefficient
malicious attacks
traffic analysis
cooperative
spatial correlation
correlation analysis
security protocols
security threats
data sets
highly correlated
security mechanisms
image watermarking
attack detection
malicious users