Login / Signup
Resisting attacks from rogue HeNB.
Cheng-Yu Tsai
Chuan-Kai Kao
Chuan-Yuan Huang
Zhi-Wei Lin
Published in:
DSC (2017)
Keyphrases
</>
watermarking algorithm
countermeasures
watermarking scheme
security threats
traffic analysis
security risks
denial of service attacks
malicious users
differential power analysis
security protocols
dos attacks
cryptographic protocols
data publishing
attack detection
stream cipher
detect malicious