Keyphrases
- countermeasures
- traffic analysis
- decision making
- malicious users
- security problems
- security protocols
- security mechanisms
- malicious attacks
- security threats
- rational agents
- computer security
- watermarking algorithm
- watermarking scheme
- information systems
- database
- differential power analysis
- bounded rationality
- terrorist attacks
- denial of service attacks
- asynchronous circuits
- image watermarking
- lightweight
- multi agent
- real time