Login / Signup
Extending the Resynchronization Attack.
Frederik Armknecht
Joseph Lano
Bart Preneel
Published in:
IACR Cryptol. ePrint Arch. (2004)
Keyphrases
</>
countermeasures
attack detection
neural network
case study
key exchange protocol
attack graphs
real time
learning algorithm
social networks
information systems
evolutionary algorithm
attack graph
graceful degradation