Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.
Maliheh ShirvanianNitesh SaxenaDibya MukhopadhyayPublished in: J. Comput. Secur. (2018)
Keyphrases
- security protocols
- human intelligence
- countermeasures
- machine vision systems
- security mechanisms
- mobile phone
- machine intelligence
- advanced encryption standard
- computational models
- human behavior
- watermarking scheme
- cryptographic algorithms
- security threats
- artificial intelligence
- resource constrained
- learning machines
- digital signature
- watermarking technique
- traffic analysis
- terrorist attacks
- intelligent machines
- learning algorithm